EnterpriseLibrary.Security.Cryptography.Configuration.Design Namespace
Retired Content |
---|
This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist. |
Classes
Class | Description | |
---|---|---|
AddCryptographySettingsNodeCommand |
Represents a command for adding the Cryptography Application Block to the current application.
|
|
AddHashAlgorithmProviderNodeCommand |
Represents a command for adding a HashAlgorithmProviderNode.
|
|
AddSymmetricAlgorithmProviderNodeCommand |
Represents a command for adding a SymmetricAlgorithmProviderNode.
|
|
ChooseDataProtectionScopeControl |
Visual control that allows an user to select the DataProtectionScope wich is used to store an cryptographic key.
|
|
ChooseKeyFileControl |
Visual control that allows an user to select the file wich is used to store an cryptographic key.
|
|
CreateNewKeyControl |
Visual control that allows an user to specify a key for an cryptography algorithm.
|
|
CryptographicKeyWizard |
UI wizard that allows an user to manipulate a ProtectedKeySettings class, from within the configuration console.
|
|
CryptographySettingsNode |
Provides designtime configuration for CryptographySettings.
|
|
CustomHashProviderNode |
Provides designtime configuration for CustomHashProviderData.
|
|
CustomSymmetricCryptoProviderNode |
Provides designtime configuration for CustomSymmetricCryptoProviderData.
|
|
DpapiSymmetricCryptoProviderNode |
Provides designtime configuration for DpapiSymmetricCryptoProviderData.
|
|
ExportKeyCommand |
Represents a command that will export a cryptographic key.
|
|
ExportKeyControl |
Visual control that allows an user to export an protected key to an archived key file.
|
|
ExportKeyUI |
UI to support exporting a ProtectedKey.
|
|
HashAlgorithmProviderNode |
Provides designtime configuration for HashAlgorithmProviderData.
|
|
HashProviderCollectionNode |
Represents the designtime logic for a collection of HashProviderNodes.
|
|
HashProviderNode |
Abstract class for nodes which provide designtime configuration for classes which derive from HashProviderData.
|
|
ImportArchivedKeyControl |
Visual control that allows an user to import an protected key from an archived key file, from within the cryptographic key wizard.
|
|
KeyedHashAlgorithmKeyCreator | Creates keys for a KeyedHashAlgorithm. |
|
KeyedHashAlgorithmProviderNode |
Provides designtime configuration for KeyedHashAlgorithmProviderData.
|
|
OpenExistingKeyFileControl |
Visual control that allows an user to select an existing key file within the cryptographic key wizard.
|
|
ProtectedKeySettings | Represents the settings to store and open a ProtectedKey. |
|
SecurityCryptographyConfigurationDesignManager |
Represents the block manager for the Authentication configuration data.
|
|
SupplyKeyControl |
Visual control that allows an user to select an to select a method of proving a key.
|
|
SymmetricAlgorithmKeyCreator | Creates keys for a SymmetricAlgorithm. |
|
SymmetricAlgorithmProviderNode |
Provides designtime configuration for SymmetricAlgorithmProviderData.
|
|
SymmetricCryptoProviderCollectionNode |
Represents the designtime logic for a collection of SymmetricCryptoProviderNodes.
|
|
SymmetricCryptoProviderNode |
Provides designtime configuration for SymmetricCryptoProviderData.
|
Interfaces
Interface | Description | |
---|---|---|
ICryptographicKeyConfigurationNode |
Represents a configuration node that contains cryptographic key infromation.
|
|
IKeyCreator | Represents the creator of keys for security algorithms. |
|
IWizardValidationTarget |
Represents the validation logic for a control within the CryptographicKeyWizard.
|
Enumerations
Enumeration | Description | |
---|---|---|
CryptographicKeyWizardStep |
Enumeration to represent the steps within the CryptographicKeyWizard.
|
|
SupplyKeyMethod |
Enumeration to represent the ways a user can provide a cryptographic key.
|
Retired Content |
---|
This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist. |