SshNet.Security.Cryptography
Gets the value of the computed hash code.
The current value of the computed hash code.
The object has already been disposed.
Computes the hash value for the specified region of the input byte array and copies the specified
region of the input byte array to the specified region of the output byte array.
The input to compute the hash code for.
The offset into the input byte array from which to begin using data.
The number of bytes in the input byte array to use as data.
A copy of the part of the input array used to compute the hash code.
The offset into the output byte array from which to begin writing data.
The number of bytes written.
uses an invalid value.
-or-
has an invalid length.
is null.
is out of range. This parameter requires a non-negative number.
The object has already been disposed.
Computes the hash value for the specified region of the specified byte array.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
An array that is a copy of the part of the input that is hashed.
uses an invalid value.
-or-
has an invalid length.
is null.
is out of range. This parameter requires a non-negative number.
The object has already been disposed.
Computes the hash value for the input data.
The input to compute the hash code for.
The computed hash code.
is null.
The object has already been disposed.
Releases all resources used by the current instance of the class.
Releases the unmanaged resources used by the and optionally releases the managed resources.
true to release both managed and unmanaged resources; false to release only unmanaged resources.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Initializes an implementation of the .
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Provides HMAC algorithm implementation.
Gets the size of the block.
The size of the block.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Initializes a with the specified hash algorithm.
The hash provider.
is null.
Initializes a with the specified hash algorithm, key and size of the computed
hash code.
The hash provider.
The key.
The size, in bits, of the computed hash code.
is null.
Initializes a with the specified hash algorithm and key.
The hash provider.
The key.
is null.
Gets or sets the key to use in the hash algorithm.
The key to use in the hash algorithm.
Initializes an implementation of the class.
Hashes the core.
The RGB.
The ib.
The cb.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Releases unmanaged and - optionally - managed resources
true to release both managed and unmanaged resources; false to release only unmanaged ResourceMessages.
Return a key that fits the of the .
The key to shorten, if necessary.
A hash of if is longer than the of the
; otherwise, .
Computes a Hash-based Message Authentication Code (HMAC) by using the MD5 hash function.
Initializes a with the specified key.
The key.
Initializes a with the specified key and size of the computed hash code.
The key.
The size, in bits, of the computed hash code.
Gets or sets the block size, in bytes, to use in the hash value.
The block size to use in the hash value. For this is 64 bytes.
Computes a Hash-based Message Authentication Code (HMAC) by using the hash function.
Initializes a with the specified key.
The key.
Gets or sets the block size, in bytes, to use in the hash value.
The block size to use in the hash value. For this is 64 bytes.
Computes a Hash-based Message Authentication Code (HMAC) by using the hash function.
Initializes a with the specified key.
The key.
Initializes a with the specified key and size of the computed hash code.
The key.
The size, in bits, of the computed hash code.
Gets or sets the block size, in bytes, to use in the hash value.
The block size to use in the hash value. For this is 64 bytes.
Computes a Hash-based Message Authentication Code (HMAC) by using the hash function.
Initializes a with the specified key.
The key.
Initializes a with the specified key and size of the computed hash code.
The key.
The size, in bits, of the computed hash code.
Gets or sets the block size, in bytes, to use in the hash value.
The block size to use in the hash value. For this is 64 bytes.
Computes a Hash-based Message Authentication Code (HMAC) by using the hash function.
Initializes a with the specified key.
The key.
Initializes a with the specified key and size of the computed hash code.
The key.
The size, in bits, of the computed hash code.
Gets or sets the block size, in bytes, to use in the hash value.
The block size to use in the hash value. For this is 128 bytes.
Computes a Hash-based Message Authentication Code (HMAC) by using the hash function.
Initializes a with the specified key.
The key.
Initializes a with the specified key and size of the computed hash code.
The key.
The size, in bits, of the computed hash code.
Gets or sets the block size, in bytes, to use in the hash value.
The block size to use in the hash value. For this is 128 bytes.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Gets the value of the computed hash code.
The current value of the computed hash code.
The object has already been disposed.
Initializes an implementation of the .
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Computes the hash value for the specified region of the input byte array and copies the specified
region of the input byte array to the specified region of the output byte array.
The input to compute the hash code for.
The offset into the input byte array from which to begin using data.
The number of bytes in the input byte array to use as data.
A copy of the part of the input array used to compute the hash code.
The offset into the output byte array from which to begin writing data.
The number of bytes written.
uses an invalid value.
-or-
has an invalid length.
is null.
is out of range. This parameter requires a non-negative number.
The object has already been disposed.
Computes the hash value for the specified region of the specified byte array.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
An array that is a copy of the part of the input that is hashed.
uses an invalid value.
-or-
has an invalid length.
is null.
is out of range. This parameter requires a non-negative number.
The object has already been disposed.
Computes the hash value for the input data.
The input to compute the hash code for.
The computed hash code.
is null.
The object has already been disposed.
MD5 algorithm implementation
Initializes a new instance of the class.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Gets a value indicating whether the current transform can be reused.
Always true.
Gets a value indicating whether multiple blocks can be transformed.
true if multiple blocks can be transformed; otherwise, false.
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.
Releases the unmanaged resources used by the and optionally releases the managed resources.
true to release both managed and unmanaged resources; false to release only unmanaged resources.
The word buffer.
Initializes a new instance of the class.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.
Cryptographic hash function based upon the Merkle–Damgård construction.
Initializes a new instance of the class.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Gets a value indicating whether the current transform can be reused.
Always true.
Gets a value indicating whether multiple blocks can be transformed.
true if multiple blocks can be transformed; otherwise, false.
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.
Releases the unmanaged resources used by the and optionally releases the managed resources.
true to release both managed and unmanaged resources; false to release only unmanaged resources.
The word buffer.
Initializes a new instance of the class.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.
Reset the chaining variables to the IV values.
Rounds 0-15
The x.
The y.
The z.
Rounds 16-31
The x.
The y.
The z.
ounds 32-47
The x.
The y.
The z.
Rounds 48-63
The x.
The y.
The z.
ounds 64-79
The x.
The y.
The z.
Computes the SHA1 hash for input data.
Initializes a new instance of the class.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Gets a value indicating whether the current transform can be reused.
Always true.
Gets a value indicating whether multiple blocks can be transformed.
true if multiple blocks can be transformed; otherwise, false.
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.
Releases the unmanaged resources used by the and optionally releases the managed resources.
true to release both managed and unmanaged resources; false to release only unmanaged resources.
The word buffer.
Initializes a new instance of the class.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.
Computes the SHA256 hash for input data.
Initializes a new instance of the class.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Gets a value indicating whether the current transform can be reused.
Always true.
Gets a value indicating whether multiple blocks can be transformed.
true if multiple blocks can be transformed; otherwise, false.
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.
Releases the unmanaged resources used by the and optionally releases the managed resources.
true to release both managed and unmanaged resources; false to release only unmanaged resources.
The word buffer.
Initializes a new instance of the class.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.
The SHA-256 Constants (represent the first 32 bits of the fractional parts of the cube roots of the first sixty-four prime numbers)
Initial hash value 1.
Initial hash value 2.
Initial hash value 3.
Initial hash value 4.
Initial hash value 5.
Initial hash value 6.
Initial hash value 7.
Initial hash value 8.
The word buffer.
Initializes a new instance of the class.
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Initializes an implementation of the class.
Finalizes the hash computation.
Adjust the byte counts so that byteCount2 represents the upper long (less 3 bits) word of the byte count.
Computes the SHA384 hash for input data.
Initializes a new instance of the class.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Gets a value indicating whether the current transform can be reused.
Always true.
Gets a value indicating whether multiple blocks can be transformed.
true if multiple blocks can be transformed; otherwise, false.
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.
Releases the unmanaged resources used by the and optionally releases the managed resources.
true to release both managed and unmanaged resources; false to release only unmanaged resources.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
When overridden in a derived class, gets the input block size.
The input block size.
When overridden in a derived class, gets the output block size.
The output block size.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.
Computes the SHA512 hash for input data.
Initializes a new instance of the class.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
Gets the input block size.
The input block size.
Gets the output block size.
The output block size.
Gets a value indicating whether the current transform can be reused.
Always true.
Gets a value indicating whether multiple blocks can be transformed.
true if multiple blocks can be transformed; otherwise, false.
Routes data written to the object into the hash algorithm for computing the hash.
The input to compute the hash code for.
The offset into the byte array from which to begin using data.
The number of bytes in the byte array to use as data.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.
Releases the unmanaged resources used by the and optionally releases the managed resources.
true to release both managed and unmanaged resources; false to release only unmanaged resources.
Gets the size, in bits, of the computed hash code.
The size, in bits, of the computed hash code.
When overridden in a derived class, gets the input block size.
The input block size.
When overridden in a derived class, gets the output block size.
The output block size.
Finalizes the hash computation after the last data is processed by the cryptographic stream object.
The computed hash code.
Initializes an implementation of the class.