com.Tivadar.Best.HTTP.xml 2.1 MB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950495149524953495449554956495749584959496049614962496349644965496649674968496949704971497249734974497549764977497849794980498149824983498449854986498749884989499049914992499349944995499649974998499950005001500250035004500550065007500850095010501150125013501450155016501750185019502050215022502350245025502650275028502950305031503250335034503550365037503850395040504150425043504450455046504750485049505050515052505350545055505650575058505950605061506250635064506550665067506850695070507150725073507450755076507750785079508050815082508350845085508650875088508950905091509250935094509550965097509850995100510151025103510451055106510751085109511051115112511351145115511651175118511951205121512251235124512551265127512851295130513151325133513451355136513751385139514051415142514351445145514651475148514951505151515251535154515551565157515851595160516151625163516451655166516751685169517051715172517351745175517651775178517951805181518251835184518551865187518851895190519151925193519451955196519751985199520052015202520352045205520652075208520952105211521252135214521552165217521852195220522152225223522452255226522752285229523052315232523352345235523652375238523952405241524252435244524552465247524852495250525152525253525452555256525752585259526052615262526352645265526652675268526952705271527252735274527552765277527852795280528152825283528452855286528752885289529052915292529352945295529652975298529953005301530253035304530553065307530853095310531153125313531453155316531753185319532053215322532353245325532653275328532953305331533253335334533553365337533853395340534153425343534453455346534753485349535053515352535353545355535653575358535953605361536253635364536553665367536853695370537153725373537453755376537753785379538053815382538353845385538653875388538953905391539253935394539553965397539853995400540154025403540454055406540754085409541054115412541354145415541654175418541954205421542254235424542554265427542854295430543154325433543454355436543754385439544054415442544354445445544654475448544954505451545254535454545554565457545854595460546154625463546454655466546754685469547054715472547354745475547654775478547954805481548254835484548554865487548854895490549154925493549454955496549754985499550055015502550355045505550655075508550955105511551255135514551555165517551855195520552155225523552455255526552755285529553055315532553355345535553655375538553955405541554255435544554555465547554855495550555155525553555455555556555755585559556055615562556355645565556655675568556955705571557255735574557555765577557855795580558155825583558455855586558755885589559055915592559355945595559655975598559956005601560256035604560556065607560856095610561156125613561456155616561756185619562056215622562356245625562656275628562956305631563256335634563556365637563856395640564156425643564456455646564756485649565056515652565356545655565656575658565956605661566256635664566556665667566856695670567156725673567456755676567756785679568056815682568356845685568656875688568956905691569256935694569556965697569856995700570157025703570457055706570757085709571057115712571357145715571657175718571957205721572257235724572557265727572857295730573157325733573457355736573757385739574057415742574357445745574657475748574957505751575257535754575557565757575857595760576157625763576457655766576757685769577057715772577357745775577657775778577957805781578257835784578557865787578857895790579157925793579457955796579757985799580058015802580358045805580658075808580958105811581258135814581558165817581858195820582158225823582458255826582758285829583058315832583358345835583658375838583958405841584258435844584558465847584858495850585158525853585458555856585758585859586058615862586358645865586658675868586958705871587258735874587558765877587858795880588158825883588458855886588758885889589058915892589358945895589658975898589959005901590259035904590559065907590859095910591159125913591459155916591759185919592059215922592359245925592659275928592959305931593259335934593559365937593859395940594159425943594459455946594759485949595059515952595359545955595659575958595959605961596259635964596559665967596859695970597159725973597459755976597759785979598059815982598359845985598659875988598959905991599259935994599559965997599859996000600160026003600460056006600760086009601060116012601360146015601660176018601960206021602260236024602560266027602860296030603160326033603460356036603760386039604060416042604360446045604660476048604960506051605260536054605560566057605860596060606160626063606460656066606760686069607060716072607360746075607660776078607960806081608260836084608560866087608860896090609160926093609460956096609760986099610061016102610361046105610661076108610961106111611261136114611561166117611861196120612161226123612461256126612761286129613061316132613361346135613661376138613961406141614261436144614561466147614861496150615161526153615461556156615761586159616061616162616361646165616661676168616961706171617261736174617561766177617861796180618161826183618461856186618761886189619061916192619361946195619661976198619962006201620262036204620562066207620862096210621162126213621462156216621762186219622062216222622362246225622662276228622962306231623262336234623562366237623862396240624162426243624462456246624762486249625062516252625362546255625662576258625962606261626262636264626562666267626862696270627162726273627462756276627762786279628062816282628362846285628662876288628962906291629262936294629562966297629862996300630163026303630463056306630763086309631063116312631363146315631663176318631963206321632263236324632563266327632863296330633163326333633463356336633763386339634063416342634363446345634663476348634963506351635263536354635563566357635863596360636163626363636463656366636763686369637063716372637363746375637663776378637963806381638263836384638563866387638863896390639163926393639463956396639763986399640064016402640364046405640664076408640964106411641264136414641564166417641864196420642164226423642464256426642764286429643064316432643364346435643664376438643964406441644264436444644564466447644864496450645164526453645464556456645764586459646064616462646364646465646664676468646964706471647264736474647564766477647864796480648164826483648464856486648764886489649064916492649364946495649664976498649965006501650265036504650565066507650865096510651165126513651465156516651765186519652065216522652365246525652665276528652965306531653265336534653565366537653865396540654165426543654465456546654765486549655065516552655365546555655665576558655965606561656265636564656565666567656865696570657165726573657465756576657765786579658065816582658365846585658665876588658965906591659265936594659565966597659865996600660166026603660466056606660766086609661066116612661366146615661666176618661966206621662266236624662566266627662866296630663166326633663466356636663766386639664066416642664366446645664666476648664966506651665266536654665566566657665866596660666166626663666466656666666766686669667066716672667366746675667666776678667966806681668266836684668566866687668866896690669166926693669466956696669766986699670067016702670367046705670667076708670967106711671267136714671567166717671867196720672167226723672467256726672767286729673067316732673367346735673667376738673967406741674267436744674567466747674867496750675167526753675467556756675767586759676067616762676367646765676667676768676967706771677267736774677567766777677867796780678167826783678467856786678767886789679067916792679367946795679667976798679968006801680268036804680568066807680868096810681168126813681468156816681768186819682068216822682368246825682668276828682968306831683268336834683568366837683868396840684168426843684468456846684768486849685068516852685368546855685668576858685968606861686268636864686568666867686868696870687168726873687468756876687768786879688068816882688368846885688668876888688968906891689268936894689568966897689868996900690169026903690469056906690769086909691069116912691369146915691669176918691969206921692269236924692569266927692869296930693169326933693469356936693769386939694069416942694369446945694669476948694969506951695269536954695569566957695869596960696169626963696469656966696769686969697069716972697369746975697669776978697969806981698269836984698569866987698869896990699169926993699469956996699769986999700070017002700370047005700670077008700970107011701270137014701570167017701870197020702170227023702470257026702770287029703070317032703370347035703670377038703970407041704270437044704570467047704870497050705170527053705470557056705770587059706070617062706370647065706670677068706970707071707270737074707570767077707870797080708170827083708470857086708770887089709070917092709370947095709670977098709971007101710271037104710571067107710871097110711171127113711471157116711771187119712071217122712371247125712671277128712971307131713271337134713571367137713871397140714171427143714471457146714771487149715071517152715371547155715671577158715971607161716271637164716571667167716871697170717171727173717471757176717771787179718071817182718371847185718671877188718971907191719271937194719571967197719871997200720172027203720472057206720772087209721072117212721372147215721672177218721972207221722272237224722572267227722872297230723172327233723472357236723772387239724072417242724372447245724672477248724972507251725272537254725572567257725872597260726172627263726472657266726772687269727072717272727372747275727672777278727972807281728272837284728572867287728872897290729172927293729472957296729772987299730073017302730373047305730673077308730973107311731273137314731573167317731873197320732173227323732473257326732773287329733073317332733373347335733673377338733973407341734273437344734573467347734873497350735173527353735473557356735773587359736073617362736373647365736673677368736973707371737273737374737573767377737873797380738173827383738473857386738773887389739073917392739373947395739673977398739974007401740274037404740574067407740874097410741174127413741474157416741774187419742074217422742374247425742674277428742974307431743274337434743574367437743874397440744174427443744474457446744774487449745074517452745374547455745674577458745974607461746274637464746574667467746874697470747174727473747474757476747774787479748074817482748374847485748674877488748974907491749274937494749574967497749874997500750175027503750475057506750775087509751075117512751375147515751675177518751975207521752275237524752575267527752875297530753175327533753475357536753775387539754075417542754375447545754675477548754975507551755275537554755575567557755875597560756175627563756475657566756775687569757075717572757375747575757675777578757975807581758275837584758575867587758875897590759175927593759475957596759775987599760076017602760376047605760676077608760976107611761276137614761576167617761876197620762176227623762476257626762776287629763076317632763376347635763676377638763976407641764276437644764576467647764876497650765176527653765476557656765776587659766076617662766376647665766676677668766976707671767276737674767576767677767876797680768176827683768476857686768776887689769076917692769376947695769676977698769977007701770277037704770577067707770877097710771177127713771477157716771777187719772077217722772377247725772677277728772977307731773277337734773577367737773877397740774177427743774477457746774777487749775077517752775377547755775677577758775977607761776277637764776577667767776877697770777177727773777477757776777777787779778077817782778377847785778677877788778977907791779277937794779577967797779877997800780178027803780478057806780778087809781078117812781378147815781678177818781978207821782278237824782578267827782878297830783178327833783478357836783778387839784078417842784378447845784678477848784978507851785278537854785578567857785878597860786178627863786478657866786778687869787078717872787378747875787678777878787978807881788278837884788578867887788878897890789178927893789478957896789778987899790079017902790379047905790679077908790979107911791279137914791579167917791879197920792179227923792479257926792779287929793079317932793379347935793679377938793979407941794279437944794579467947794879497950795179527953795479557956795779587959796079617962796379647965796679677968796979707971797279737974797579767977797879797980798179827983798479857986798779887989799079917992799379947995799679977998799980008001800280038004800580068007800880098010801180128013801480158016801780188019802080218022802380248025802680278028802980308031803280338034803580368037803880398040804180428043804480458046804780488049805080518052805380548055805680578058805980608061806280638064806580668067806880698070807180728073807480758076807780788079808080818082808380848085808680878088808980908091809280938094809580968097809880998100810181028103810481058106810781088109811081118112811381148115811681178118811981208121812281238124812581268127812881298130813181328133813481358136813781388139814081418142814381448145814681478148814981508151815281538154815581568157815881598160816181628163816481658166816781688169817081718172817381748175817681778178817981808181818281838184818581868187818881898190819181928193819481958196819781988199820082018202820382048205820682078208820982108211821282138214821582168217821882198220822182228223822482258226822782288229823082318232823382348235823682378238823982408241824282438244824582468247824882498250825182528253825482558256825782588259826082618262826382648265826682678268826982708271827282738274827582768277827882798280828182828283828482858286828782888289829082918292829382948295829682978298829983008301830283038304830583068307830883098310831183128313831483158316831783188319832083218322832383248325832683278328832983308331833283338334833583368337833883398340834183428343834483458346834783488349835083518352835383548355835683578358835983608361836283638364836583668367836883698370837183728373837483758376837783788379838083818382838383848385838683878388838983908391839283938394839583968397839883998400840184028403840484058406840784088409841084118412841384148415841684178418841984208421842284238424842584268427842884298430843184328433843484358436843784388439844084418442844384448445844684478448844984508451845284538454845584568457845884598460846184628463846484658466846784688469847084718472847384748475847684778478847984808481848284838484848584868487848884898490849184928493849484958496849784988499850085018502850385048505850685078508850985108511851285138514851585168517851885198520852185228523852485258526852785288529853085318532853385348535853685378538853985408541854285438544854585468547854885498550855185528553855485558556855785588559856085618562856385648565856685678568856985708571857285738574857585768577857885798580858185828583858485858586858785888589859085918592859385948595859685978598859986008601860286038604860586068607860886098610861186128613861486158616861786188619862086218622862386248625862686278628862986308631863286338634863586368637863886398640864186428643864486458646864786488649865086518652865386548655865686578658865986608661866286638664866586668667866886698670867186728673867486758676867786788679868086818682868386848685868686878688868986908691869286938694869586968697869886998700870187028703870487058706870787088709871087118712871387148715871687178718871987208721872287238724872587268727872887298730873187328733873487358736873787388739874087418742874387448745874687478748874987508751875287538754875587568757875887598760876187628763876487658766876787688769877087718772877387748775877687778778877987808781878287838784878587868787878887898790879187928793879487958796879787988799880088018802880388048805880688078808880988108811881288138814881588168817881888198820882188228823882488258826882788288829883088318832883388348835883688378838883988408841884288438844884588468847884888498850885188528853885488558856885788588859886088618862886388648865886688678868886988708871887288738874887588768877887888798880888188828883888488858886888788888889889088918892889388948895889688978898889989008901890289038904890589068907890889098910891189128913891489158916891789188919892089218922892389248925892689278928892989308931893289338934893589368937893889398940894189428943894489458946894789488949895089518952895389548955895689578958895989608961896289638964896589668967896889698970897189728973897489758976897789788979898089818982898389848985898689878988898989908991899289938994899589968997899889999000900190029003900490059006900790089009901090119012901390149015901690179018901990209021902290239024902590269027902890299030903190329033903490359036903790389039904090419042904390449045904690479048904990509051905290539054905590569057905890599060906190629063906490659066906790689069907090719072907390749075907690779078907990809081908290839084908590869087908890899090909190929093909490959096909790989099910091019102910391049105910691079108910991109111911291139114911591169117911891199120912191229123912491259126912791289129913091319132913391349135913691379138913991409141914291439144914591469147914891499150915191529153915491559156915791589159916091619162916391649165916691679168916991709171917291739174917591769177917891799180918191829183918491859186918791889189919091919192919391949195919691979198919992009201920292039204920592069207920892099210921192129213921492159216921792189219922092219222922392249225922692279228922992309231923292339234923592369237923892399240924192429243924492459246924792489249925092519252925392549255925692579258925992609261926292639264926592669267926892699270927192729273927492759276927792789279928092819282928392849285928692879288928992909291929292939294929592969297929892999300930193029303930493059306930793089309931093119312931393149315931693179318931993209321932293239324932593269327932893299330933193329333933493359336933793389339934093419342934393449345934693479348934993509351935293539354935593569357935893599360936193629363936493659366936793689369937093719372937393749375937693779378937993809381938293839384938593869387938893899390939193929393939493959396939793989399940094019402940394049405940694079408940994109411941294139414941594169417941894199420942194229423942494259426942794289429943094319432943394349435943694379438943994409441944294439444944594469447944894499450945194529453945494559456945794589459946094619462946394649465946694679468946994709471947294739474947594769477947894799480948194829483948494859486948794889489949094919492949394949495949694979498949995009501950295039504950595069507950895099510951195129513951495159516951795189519952095219522952395249525952695279528952995309531953295339534953595369537953895399540954195429543954495459546954795489549955095519552955395549555955695579558955995609561956295639564956595669567956895699570957195729573957495759576957795789579958095819582958395849585958695879588958995909591959295939594959595969597959895999600960196029603960496059606960796089609961096119612961396149615961696179618961996209621962296239624962596269627962896299630963196329633963496359636963796389639964096419642964396449645964696479648964996509651965296539654965596569657965896599660966196629663966496659666966796689669967096719672967396749675967696779678967996809681968296839684968596869687968896899690969196929693969496959696969796989699970097019702970397049705970697079708970997109711971297139714971597169717971897199720972197229723972497259726972797289729973097319732973397349735973697379738973997409741974297439744974597469747974897499750975197529753975497559756975797589759976097619762976397649765976697679768976997709771977297739774977597769777977897799780978197829783978497859786978797889789979097919792979397949795979697979798979998009801980298039804980598069807980898099810981198129813981498159816981798189819982098219822982398249825982698279828982998309831983298339834983598369837983898399840984198429843984498459846984798489849985098519852985398549855985698579858985998609861986298639864986598669867986898699870987198729873987498759876987798789879988098819882988398849885988698879888988998909891989298939894989598969897989898999900990199029903990499059906990799089909991099119912991399149915991699179918991999209921992299239924992599269927992899299930993199329933993499359936993799389939994099419942994399449945994699479948994999509951995299539954995599569957995899599960996199629963996499659966996799689969997099719972997399749975997699779978997999809981998299839984998599869987998899899990999199929993999499959996999799989999100001000110002100031000410005100061000710008100091001010011100121001310014100151001610017100181001910020100211002210023100241002510026100271002810029100301003110032100331003410035100361003710038100391004010041100421004310044100451004610047100481004910050100511005210053100541005510056100571005810059100601006110062100631006410065100661006710068100691007010071100721007310074100751007610077100781007910080100811008210083100841008510086100871008810089100901009110092100931009410095100961009710098100991010010101101021010310104101051010610107101081010910110101111011210113101141011510116101171011810119101201012110122101231012410125101261012710128101291013010131101321013310134101351013610137101381013910140101411014210143101441014510146101471014810149101501015110152101531015410155101561015710158101591016010161101621016310164101651016610167101681016910170101711017210173101741017510176101771017810179101801018110182101831018410185101861018710188101891019010191101921019310194101951019610197101981019910200102011020210203102041020510206102071020810209102101021110212102131021410215102161021710218102191022010221102221022310224102251022610227102281022910230102311023210233102341023510236102371023810239102401024110242102431024410245102461024710248102491025010251102521025310254102551025610257102581025910260102611026210263102641026510266102671026810269102701027110272102731027410275102761027710278102791028010281102821028310284102851028610287102881028910290102911029210293102941029510296102971029810299103001030110302103031030410305103061030710308103091031010311103121031310314103151031610317103181031910320103211032210323103241032510326103271032810329103301033110332103331033410335103361033710338103391034010341103421034310344103451034610347103481034910350103511035210353103541035510356103571035810359103601036110362103631036410365103661036710368103691037010371103721037310374103751037610377103781037910380103811038210383103841038510386103871038810389103901039110392103931039410395103961039710398103991040010401104021040310404104051040610407104081040910410104111041210413104141041510416104171041810419104201042110422104231042410425104261042710428104291043010431104321043310434104351043610437104381043910440104411044210443104441044510446104471044810449104501045110452104531045410455104561045710458104591046010461104621046310464104651046610467104681046910470104711047210473104741047510476104771047810479104801048110482104831048410485104861048710488104891049010491104921049310494104951049610497104981049910500105011050210503105041050510506105071050810509105101051110512105131051410515105161051710518105191052010521105221052310524105251052610527105281052910530105311053210533105341053510536105371053810539105401054110542105431054410545105461054710548105491055010551105521055310554105551055610557105581055910560105611056210563105641056510566105671056810569105701057110572105731057410575105761057710578105791058010581105821058310584105851058610587105881058910590105911059210593105941059510596105971059810599106001060110602106031060410605106061060710608106091061010611106121061310614106151061610617106181061910620106211062210623106241062510626106271062810629106301063110632106331063410635106361063710638106391064010641106421064310644106451064610647106481064910650106511065210653106541065510656106571065810659106601066110662106631066410665106661066710668106691067010671106721067310674106751067610677106781067910680106811068210683106841068510686106871068810689106901069110692106931069410695106961069710698106991070010701107021070310704107051070610707107081070910710107111071210713107141071510716107171071810719107201072110722107231072410725107261072710728107291073010731107321073310734107351073610737107381073910740107411074210743107441074510746107471074810749107501075110752107531075410755107561075710758107591076010761107621076310764107651076610767107681076910770107711077210773107741077510776107771077810779107801078110782107831078410785107861078710788107891079010791107921079310794107951079610797107981079910800108011080210803108041080510806108071080810809108101081110812108131081410815108161081710818108191082010821108221082310824108251082610827108281082910830108311083210833108341083510836108371083810839108401084110842108431084410845108461084710848108491085010851108521085310854108551085610857108581085910860108611086210863108641086510866108671086810869108701087110872108731087410875108761087710878108791088010881108821088310884108851088610887108881088910890108911089210893108941089510896108971089810899109001090110902109031090410905109061090710908109091091010911109121091310914109151091610917109181091910920109211092210923109241092510926109271092810929109301093110932109331093410935109361093710938109391094010941109421094310944109451094610947109481094910950109511095210953109541095510956109571095810959109601096110962109631096410965109661096710968109691097010971109721097310974109751097610977109781097910980109811098210983109841098510986109871098810989109901099110992109931099410995109961099710998109991100011001110021100311004110051100611007110081100911010110111101211013110141101511016110171101811019110201102111022110231102411025110261102711028110291103011031110321103311034110351103611037110381103911040110411104211043110441104511046110471104811049110501105111052110531105411055110561105711058110591106011061110621106311064110651106611067110681106911070110711107211073110741107511076110771107811079110801108111082110831108411085110861108711088110891109011091110921109311094110951109611097110981109911100111011110211103111041110511106111071110811109111101111111112111131111411115111161111711118111191112011121111221112311124111251112611127111281112911130111311113211133111341113511136111371113811139111401114111142111431114411145111461114711148111491115011151111521115311154111551115611157111581115911160111611116211163111641116511166111671116811169111701117111172111731117411175111761117711178111791118011181111821118311184111851118611187111881118911190111911119211193111941119511196111971119811199112001120111202112031120411205112061120711208112091121011211112121121311214112151121611217112181121911220112211122211223112241122511226112271122811229112301123111232112331123411235112361123711238112391124011241112421124311244112451124611247112481124911250112511125211253112541125511256112571125811259112601126111262112631126411265112661126711268112691127011271112721127311274112751127611277112781127911280112811128211283112841128511286112871128811289112901129111292112931129411295112961129711298112991130011301113021130311304113051130611307113081130911310113111131211313113141131511316113171131811319113201132111322113231132411325113261132711328113291133011331113321133311334113351133611337113381133911340113411134211343113441134511346113471134811349113501135111352113531135411355113561135711358113591136011361113621136311364113651136611367113681136911370113711137211373113741137511376113771137811379113801138111382113831138411385113861138711388113891139011391113921139311394113951139611397113981139911400114011140211403114041140511406114071140811409114101141111412114131141411415114161141711418114191142011421114221142311424114251142611427114281142911430114311143211433114341143511436114371143811439114401144111442114431144411445114461144711448114491145011451114521145311454114551145611457114581145911460114611146211463114641146511466114671146811469114701147111472114731147411475114761147711478114791148011481114821148311484114851148611487114881148911490114911149211493114941149511496114971149811499115001150111502115031150411505115061150711508115091151011511115121151311514115151151611517115181151911520115211152211523115241152511526115271152811529115301153111532115331153411535115361153711538115391154011541115421154311544115451154611547115481154911550115511155211553115541155511556115571155811559115601156111562115631156411565115661156711568115691157011571115721157311574115751157611577115781157911580115811158211583115841158511586115871158811589115901159111592115931159411595115961159711598115991160011601116021160311604116051160611607116081160911610116111161211613116141161511616116171161811619116201162111622116231162411625116261162711628116291163011631116321163311634116351163611637116381163911640116411164211643116441164511646116471164811649116501165111652116531165411655116561165711658116591166011661116621166311664116651166611667116681166911670116711167211673116741167511676116771167811679116801168111682116831168411685116861168711688116891169011691116921169311694116951169611697116981169911700117011170211703117041170511706117071170811709117101171111712117131171411715117161171711718117191172011721117221172311724117251172611727117281172911730117311173211733117341173511736117371173811739117401174111742117431174411745117461174711748117491175011751117521175311754117551175611757117581175911760117611176211763117641176511766117671176811769117701177111772117731177411775117761177711778117791178011781117821178311784117851178611787117881178911790117911179211793117941179511796117971179811799118001180111802118031180411805118061180711808118091181011811118121181311814118151181611817118181181911820118211182211823118241182511826118271182811829118301183111832118331183411835118361183711838118391184011841118421184311844118451184611847118481184911850118511185211853118541185511856118571185811859118601186111862118631186411865118661186711868118691187011871118721187311874118751187611877118781187911880118811188211883118841188511886118871188811889118901189111892118931189411895118961189711898118991190011901119021190311904119051190611907119081190911910119111191211913119141191511916119171191811919119201192111922119231192411925119261192711928119291193011931119321193311934119351193611937119381193911940119411194211943119441194511946119471194811949119501195111952119531195411955119561195711958119591196011961119621196311964119651196611967119681196911970119711197211973119741197511976119771197811979119801198111982119831198411985119861198711988119891199011991119921199311994119951199611997119981199912000120011200212003120041200512006120071200812009120101201112012120131201412015120161201712018120191202012021120221202312024120251202612027120281202912030120311203212033120341203512036120371203812039120401204112042120431204412045120461204712048120491205012051120521205312054120551205612057120581205912060120611206212063120641206512066120671206812069120701207112072120731207412075120761207712078120791208012081120821208312084120851208612087120881208912090120911209212093120941209512096120971209812099121001210112102121031210412105121061210712108121091211012111121121211312114121151211612117121181211912120121211212212123121241212512126121271212812129121301213112132121331213412135121361213712138121391214012141121421214312144121451214612147121481214912150121511215212153121541215512156121571215812159121601216112162121631216412165121661216712168121691217012171121721217312174121751217612177121781217912180121811218212183121841218512186121871218812189121901219112192121931219412195121961219712198121991220012201122021220312204122051220612207122081220912210122111221212213122141221512216122171221812219122201222112222122231222412225122261222712228122291223012231122321223312234122351223612237122381223912240122411224212243122441224512246122471224812249122501225112252122531225412255122561225712258122591226012261122621226312264122651226612267122681226912270122711227212273122741227512276122771227812279122801228112282122831228412285122861228712288122891229012291122921229312294122951229612297122981229912300123011230212303123041230512306123071230812309123101231112312123131231412315123161231712318123191232012321123221232312324123251232612327123281232912330123311233212333123341233512336123371233812339123401234112342123431234412345123461234712348123491235012351123521235312354123551235612357123581235912360123611236212363123641236512366123671236812369123701237112372123731237412375123761237712378123791238012381123821238312384123851238612387123881238912390123911239212393123941239512396123971239812399124001240112402124031240412405124061240712408124091241012411124121241312414124151241612417124181241912420124211242212423124241242512426124271242812429124301243112432124331243412435124361243712438124391244012441124421244312444124451244612447124481244912450124511245212453124541245512456124571245812459124601246112462124631246412465124661246712468124691247012471124721247312474124751247612477124781247912480124811248212483124841248512486124871248812489124901249112492124931249412495124961249712498124991250012501125021250312504125051250612507125081250912510125111251212513125141251512516125171251812519125201252112522125231252412525125261252712528125291253012531125321253312534125351253612537125381253912540125411254212543125441254512546125471254812549125501255112552125531255412555125561255712558125591256012561125621256312564125651256612567125681256912570125711257212573125741257512576125771257812579125801258112582125831258412585125861258712588125891259012591125921259312594125951259612597125981259912600126011260212603126041260512606126071260812609126101261112612126131261412615126161261712618126191262012621126221262312624126251262612627126281262912630126311263212633126341263512636126371263812639126401264112642126431264412645126461264712648126491265012651126521265312654126551265612657126581265912660126611266212663126641266512666126671266812669126701267112672126731267412675126761267712678126791268012681126821268312684126851268612687126881268912690126911269212693126941269512696126971269812699127001270112702127031270412705127061270712708127091271012711127121271312714127151271612717127181271912720127211272212723127241272512726127271272812729127301273112732127331273412735127361273712738127391274012741127421274312744127451274612747127481274912750127511275212753127541275512756127571275812759127601276112762127631276412765127661276712768127691277012771127721277312774127751277612777127781277912780127811278212783127841278512786127871278812789127901279112792127931279412795127961279712798127991280012801128021280312804128051280612807128081280912810128111281212813128141281512816128171281812819128201282112822128231282412825128261282712828128291283012831128321283312834128351283612837128381283912840128411284212843128441284512846128471284812849128501285112852128531285412855128561285712858128591286012861128621286312864128651286612867128681286912870128711287212873128741287512876128771287812879128801288112882128831288412885128861288712888128891289012891128921289312894128951289612897128981289912900129011290212903129041290512906129071290812909129101291112912129131291412915129161291712918129191292012921129221292312924129251292612927129281292912930129311293212933129341293512936129371293812939129401294112942129431294412945129461294712948129491295012951129521295312954129551295612957129581295912960129611296212963129641296512966129671296812969129701297112972129731297412975129761297712978129791298012981129821298312984129851298612987129881298912990129911299212993129941299512996129971299812999130001300113002130031300413005130061300713008130091301013011130121301313014130151301613017130181301913020130211302213023130241302513026130271302813029130301303113032130331303413035130361303713038130391304013041130421304313044130451304613047130481304913050130511305213053130541305513056130571305813059130601306113062130631306413065130661306713068130691307013071130721307313074130751307613077130781307913080130811308213083130841308513086130871308813089130901309113092130931309413095130961309713098130991310013101131021310313104131051310613107131081310913110131111311213113131141311513116131171311813119131201312113122131231312413125131261312713128131291313013131131321313313134131351313613137131381313913140131411314213143131441314513146131471314813149131501315113152131531315413155131561315713158131591316013161131621316313164131651316613167131681316913170131711317213173131741317513176131771317813179131801318113182131831318413185131861318713188131891319013191131921319313194131951319613197131981319913200132011320213203132041320513206132071320813209132101321113212132131321413215132161321713218132191322013221132221322313224132251322613227132281322913230132311323213233132341323513236132371323813239132401324113242132431324413245132461324713248132491325013251132521325313254132551325613257132581325913260132611326213263132641326513266132671326813269132701327113272132731327413275132761327713278132791328013281132821328313284132851328613287132881328913290132911329213293132941329513296132971329813299133001330113302133031330413305133061330713308133091331013311133121331313314133151331613317133181331913320133211332213323133241332513326133271332813329133301333113332133331333413335133361333713338133391334013341133421334313344133451334613347133481334913350133511335213353133541335513356133571335813359133601336113362133631336413365133661336713368133691337013371133721337313374133751337613377133781337913380133811338213383133841338513386133871338813389133901339113392133931339413395133961339713398133991340013401134021340313404134051340613407134081340913410134111341213413134141341513416134171341813419134201342113422134231342413425134261342713428134291343013431134321343313434134351343613437134381343913440134411344213443134441344513446134471344813449134501345113452134531345413455134561345713458134591346013461134621346313464134651346613467134681346913470134711347213473134741347513476134771347813479134801348113482134831348413485134861348713488134891349013491134921349313494134951349613497134981349913500135011350213503135041350513506135071350813509135101351113512135131351413515135161351713518135191352013521135221352313524135251352613527135281352913530135311353213533135341353513536135371353813539135401354113542135431354413545135461354713548135491355013551135521355313554135551355613557135581355913560135611356213563135641356513566135671356813569135701357113572135731357413575135761357713578135791358013581135821358313584135851358613587135881358913590135911359213593135941359513596135971359813599136001360113602136031360413605136061360713608136091361013611136121361313614136151361613617136181361913620136211362213623136241362513626136271362813629136301363113632136331363413635136361363713638136391364013641136421364313644136451364613647136481364913650136511365213653136541365513656136571365813659136601366113662136631366413665136661366713668136691367013671136721367313674136751367613677136781367913680136811368213683136841368513686136871368813689136901369113692136931369413695136961369713698136991370013701137021370313704137051370613707137081370913710137111371213713137141371513716137171371813719137201372113722137231372413725137261372713728137291373013731137321373313734137351373613737137381373913740137411374213743137441374513746137471374813749137501375113752137531375413755137561375713758137591376013761137621376313764137651376613767137681376913770137711377213773137741377513776137771377813779137801378113782137831378413785137861378713788137891379013791137921379313794137951379613797137981379913800138011380213803138041380513806138071380813809138101381113812138131381413815138161381713818138191382013821138221382313824138251382613827138281382913830138311383213833138341383513836138371383813839138401384113842138431384413845138461384713848138491385013851138521385313854138551385613857138581385913860138611386213863138641386513866138671386813869138701387113872138731387413875138761387713878138791388013881138821388313884138851388613887138881388913890138911389213893138941389513896138971389813899139001390113902139031390413905139061390713908139091391013911139121391313914139151391613917139181391913920139211392213923139241392513926139271392813929139301393113932139331393413935139361393713938139391394013941139421394313944139451394613947139481394913950139511395213953139541395513956139571395813959139601396113962139631396413965139661396713968139691397013971139721397313974139751397613977139781397913980139811398213983139841398513986139871398813989139901399113992139931399413995139961399713998139991400014001140021400314004140051400614007140081400914010140111401214013140141401514016140171401814019140201402114022140231402414025140261402714028140291403014031140321403314034140351403614037140381403914040140411404214043140441404514046140471404814049140501405114052140531405414055140561405714058140591406014061140621406314064140651406614067140681406914070140711407214073140741407514076140771407814079140801408114082140831408414085140861408714088140891409014091140921409314094140951409614097140981409914100141011410214103141041410514106141071410814109141101411114112141131411414115141161411714118141191412014121141221412314124141251412614127141281412914130141311413214133141341413514136141371413814139141401414114142141431414414145141461414714148141491415014151141521415314154141551415614157141581415914160141611416214163141641416514166141671416814169141701417114172141731417414175141761417714178141791418014181141821418314184141851418614187141881418914190141911419214193141941419514196141971419814199142001420114202142031420414205142061420714208142091421014211142121421314214142151421614217142181421914220142211422214223142241422514226142271422814229142301423114232142331423414235142361423714238142391424014241142421424314244142451424614247142481424914250142511425214253142541425514256142571425814259142601426114262142631426414265142661426714268142691427014271142721427314274142751427614277142781427914280142811428214283142841428514286142871428814289142901429114292142931429414295142961429714298142991430014301143021430314304143051430614307143081430914310143111431214313143141431514316143171431814319143201432114322143231432414325143261432714328143291433014331143321433314334143351433614337143381433914340143411434214343143441434514346143471434814349143501435114352143531435414355143561435714358143591436014361143621436314364143651436614367143681436914370143711437214373143741437514376143771437814379143801438114382143831438414385143861438714388143891439014391143921439314394143951439614397143981439914400144011440214403144041440514406144071440814409144101441114412144131441414415144161441714418144191442014421144221442314424144251442614427144281442914430144311443214433144341443514436144371443814439144401444114442144431444414445144461444714448144491445014451144521445314454144551445614457144581445914460144611446214463144641446514466144671446814469144701447114472144731447414475144761447714478144791448014481144821448314484144851448614487144881448914490144911449214493144941449514496144971449814499145001450114502145031450414505145061450714508145091451014511145121451314514145151451614517145181451914520145211452214523145241452514526145271452814529145301453114532145331453414535145361453714538145391454014541145421454314544145451454614547145481454914550145511455214553145541455514556145571455814559145601456114562145631456414565145661456714568145691457014571145721457314574145751457614577145781457914580145811458214583145841458514586145871458814589145901459114592145931459414595145961459714598145991460014601146021460314604146051460614607146081460914610146111461214613146141461514616146171461814619146201462114622146231462414625146261462714628146291463014631146321463314634146351463614637146381463914640146411464214643146441464514646146471464814649146501465114652146531465414655146561465714658146591466014661146621466314664146651466614667146681466914670146711467214673146741467514676146771467814679146801468114682146831468414685146861468714688146891469014691146921469314694146951469614697146981469914700147011470214703147041470514706147071470814709147101471114712147131471414715147161471714718147191472014721147221472314724147251472614727147281472914730147311473214733147341473514736147371473814739147401474114742147431474414745147461474714748147491475014751147521475314754147551475614757147581475914760147611476214763147641476514766147671476814769147701477114772147731477414775147761477714778147791478014781147821478314784147851478614787147881478914790147911479214793147941479514796147971479814799148001480114802148031480414805148061480714808148091481014811148121481314814148151481614817148181481914820148211482214823148241482514826148271482814829148301483114832148331483414835148361483714838148391484014841148421484314844148451484614847148481484914850148511485214853148541485514856148571485814859148601486114862148631486414865148661486714868148691487014871148721487314874148751487614877148781487914880148811488214883148841488514886148871488814889148901489114892148931489414895148961489714898148991490014901149021490314904149051490614907149081490914910149111491214913149141491514916149171491814919149201492114922149231492414925149261492714928149291493014931149321493314934149351493614937149381493914940149411494214943149441494514946149471494814949149501495114952149531495414955149561495714958149591496014961149621496314964149651496614967149681496914970149711497214973149741497514976149771497814979149801498114982149831498414985149861498714988149891499014991149921499314994149951499614997149981499915000150011500215003150041500515006150071500815009150101501115012150131501415015150161501715018150191502015021150221502315024150251502615027150281502915030150311503215033150341503515036150371503815039150401504115042150431504415045150461504715048150491505015051150521505315054150551505615057150581505915060150611506215063150641506515066150671506815069150701507115072150731507415075150761507715078150791508015081150821508315084150851508615087150881508915090150911509215093150941509515096150971509815099151001510115102151031510415105151061510715108151091511015111151121511315114151151511615117151181511915120151211512215123151241512515126151271512815129151301513115132151331513415135151361513715138151391514015141151421514315144151451514615147151481514915150151511515215153151541515515156151571515815159151601516115162151631516415165151661516715168151691517015171151721517315174151751517615177151781517915180151811518215183151841518515186151871518815189151901519115192151931519415195151961519715198151991520015201152021520315204152051520615207152081520915210152111521215213152141521515216152171521815219152201522115222152231522415225152261522715228152291523015231152321523315234152351523615237152381523915240152411524215243152441524515246152471524815249152501525115252152531525415255152561525715258152591526015261152621526315264152651526615267152681526915270152711527215273152741527515276152771527815279152801528115282152831528415285152861528715288152891529015291152921529315294152951529615297152981529915300153011530215303153041530515306153071530815309153101531115312153131531415315153161531715318153191532015321153221532315324153251532615327153281532915330153311533215333153341533515336153371533815339153401534115342153431534415345153461534715348153491535015351153521535315354153551535615357153581535915360153611536215363153641536515366153671536815369153701537115372153731537415375153761537715378153791538015381153821538315384153851538615387153881538915390153911539215393153941539515396153971539815399154001540115402154031540415405154061540715408154091541015411154121541315414154151541615417154181541915420154211542215423154241542515426154271542815429154301543115432154331543415435154361543715438154391544015441154421544315444154451544615447154481544915450154511545215453154541545515456154571545815459154601546115462154631546415465154661546715468154691547015471154721547315474154751547615477154781547915480154811548215483154841548515486154871548815489154901549115492154931549415495154961549715498154991550015501155021550315504155051550615507155081550915510155111551215513155141551515516155171551815519155201552115522155231552415525155261552715528155291553015531155321553315534155351553615537155381553915540155411554215543155441554515546155471554815549155501555115552155531555415555155561555715558155591556015561155621556315564155651556615567155681556915570155711557215573155741557515576155771557815579155801558115582155831558415585155861558715588155891559015591155921559315594155951559615597155981559915600156011560215603156041560515606156071560815609156101561115612156131561415615156161561715618156191562015621156221562315624156251562615627156281562915630156311563215633156341563515636156371563815639156401564115642156431564415645156461564715648156491565015651156521565315654156551565615657156581565915660156611566215663156641566515666156671566815669156701567115672156731567415675156761567715678156791568015681156821568315684156851568615687156881568915690156911569215693156941569515696156971569815699157001570115702157031570415705157061570715708157091571015711157121571315714157151571615717157181571915720157211572215723157241572515726157271572815729157301573115732157331573415735157361573715738157391574015741157421574315744157451574615747157481574915750157511575215753157541575515756157571575815759157601576115762157631576415765157661576715768157691577015771157721577315774157751577615777157781577915780157811578215783157841578515786157871578815789157901579115792157931579415795157961579715798157991580015801158021580315804158051580615807158081580915810158111581215813158141581515816158171581815819158201582115822158231582415825158261582715828158291583015831158321583315834158351583615837158381583915840158411584215843158441584515846158471584815849158501585115852158531585415855158561585715858158591586015861158621586315864158651586615867158681586915870158711587215873158741587515876158771587815879158801588115882158831588415885158861588715888158891589015891158921589315894158951589615897158981589915900159011590215903159041590515906159071590815909159101591115912159131591415915159161591715918159191592015921159221592315924159251592615927159281592915930159311593215933159341593515936159371593815939159401594115942159431594415945159461594715948159491595015951159521595315954159551595615957159581595915960159611596215963159641596515966159671596815969159701597115972159731597415975159761597715978159791598015981159821598315984159851598615987159881598915990159911599215993159941599515996159971599815999160001600116002160031600416005160061600716008160091601016011160121601316014160151601616017160181601916020160211602216023160241602516026160271602816029160301603116032160331603416035160361603716038160391604016041160421604316044160451604616047160481604916050160511605216053160541605516056160571605816059160601606116062160631606416065160661606716068160691607016071160721607316074160751607616077160781607916080160811608216083160841608516086160871608816089160901609116092160931609416095160961609716098160991610016101161021610316104161051610616107161081610916110161111611216113161141611516116161171611816119161201612116122161231612416125161261612716128161291613016131161321613316134161351613616137161381613916140161411614216143161441614516146161471614816149161501615116152161531615416155161561615716158161591616016161161621616316164161651616616167161681616916170161711617216173161741617516176161771617816179161801618116182161831618416185161861618716188161891619016191161921619316194161951619616197161981619916200162011620216203162041620516206162071620816209162101621116212162131621416215162161621716218162191622016221162221622316224162251622616227162281622916230162311623216233162341623516236162371623816239162401624116242162431624416245162461624716248162491625016251162521625316254162551625616257162581625916260162611626216263162641626516266162671626816269162701627116272162731627416275162761627716278162791628016281162821628316284162851628616287162881628916290162911629216293162941629516296162971629816299163001630116302163031630416305163061630716308163091631016311163121631316314163151631616317163181631916320163211632216323163241632516326163271632816329163301633116332163331633416335163361633716338163391634016341163421634316344163451634616347163481634916350163511635216353163541635516356163571635816359163601636116362163631636416365163661636716368163691637016371163721637316374163751637616377163781637916380163811638216383163841638516386163871638816389163901639116392163931639416395163961639716398163991640016401164021640316404164051640616407164081640916410164111641216413164141641516416164171641816419164201642116422164231642416425164261642716428164291643016431164321643316434164351643616437164381643916440164411644216443164441644516446164471644816449164501645116452164531645416455164561645716458164591646016461164621646316464164651646616467164681646916470164711647216473164741647516476164771647816479164801648116482164831648416485164861648716488164891649016491164921649316494164951649616497164981649916500165011650216503165041650516506165071650816509165101651116512165131651416515165161651716518165191652016521165221652316524165251652616527165281652916530165311653216533165341653516536165371653816539165401654116542165431654416545165461654716548165491655016551165521655316554165551655616557165581655916560165611656216563165641656516566165671656816569165701657116572165731657416575165761657716578165791658016581165821658316584165851658616587165881658916590165911659216593165941659516596165971659816599166001660116602166031660416605166061660716608166091661016611166121661316614166151661616617166181661916620166211662216623166241662516626166271662816629166301663116632166331663416635166361663716638166391664016641166421664316644166451664616647166481664916650166511665216653166541665516656166571665816659166601666116662166631666416665166661666716668166691667016671166721667316674166751667616677166781667916680166811668216683166841668516686166871668816689166901669116692166931669416695166961669716698166991670016701167021670316704167051670616707167081670916710167111671216713167141671516716167171671816719167201672116722167231672416725167261672716728167291673016731167321673316734167351673616737167381673916740167411674216743167441674516746167471674816749167501675116752167531675416755167561675716758167591676016761167621676316764167651676616767167681676916770167711677216773167741677516776167771677816779167801678116782167831678416785167861678716788167891679016791167921679316794167951679616797167981679916800168011680216803168041680516806168071680816809168101681116812168131681416815168161681716818168191682016821168221682316824168251682616827168281682916830168311683216833168341683516836168371683816839168401684116842168431684416845168461684716848168491685016851168521685316854168551685616857168581685916860168611686216863168641686516866168671686816869168701687116872168731687416875168761687716878168791688016881168821688316884168851688616887168881688916890168911689216893168941689516896168971689816899169001690116902169031690416905169061690716908169091691016911169121691316914169151691616917169181691916920169211692216923169241692516926169271692816929169301693116932169331693416935169361693716938169391694016941169421694316944169451694616947169481694916950169511695216953169541695516956169571695816959169601696116962169631696416965169661696716968169691697016971169721697316974169751697616977169781697916980169811698216983169841698516986169871698816989169901699116992169931699416995169961699716998169991700017001170021700317004170051700617007170081700917010170111701217013170141701517016170171701817019170201702117022170231702417025170261702717028170291703017031170321703317034170351703617037170381703917040170411704217043170441704517046170471704817049170501705117052170531705417055170561705717058170591706017061170621706317064170651706617067170681706917070170711707217073170741707517076170771707817079170801708117082170831708417085170861708717088170891709017091170921709317094170951709617097170981709917100171011710217103171041710517106171071710817109171101711117112171131711417115171161711717118171191712017121171221712317124171251712617127171281712917130171311713217133171341713517136171371713817139171401714117142171431714417145171461714717148171491715017151171521715317154171551715617157171581715917160171611716217163171641716517166171671716817169171701717117172171731717417175171761717717178171791718017181171821718317184171851718617187171881718917190171911719217193171941719517196171971719817199172001720117202172031720417205172061720717208172091721017211172121721317214172151721617217172181721917220172211722217223172241722517226172271722817229172301723117232172331723417235172361723717238172391724017241172421724317244172451724617247172481724917250172511725217253172541725517256172571725817259172601726117262172631726417265172661726717268172691727017271172721727317274172751727617277172781727917280172811728217283172841728517286172871728817289172901729117292172931729417295172961729717298172991730017301173021730317304173051730617307173081730917310173111731217313173141731517316173171731817319173201732117322173231732417325173261732717328173291733017331173321733317334173351733617337173381733917340173411734217343173441734517346173471734817349173501735117352173531735417355173561735717358173591736017361173621736317364173651736617367173681736917370173711737217373173741737517376173771737817379173801738117382173831738417385173861738717388173891739017391173921739317394173951739617397173981739917400174011740217403174041740517406174071740817409174101741117412174131741417415174161741717418174191742017421174221742317424174251742617427174281742917430174311743217433174341743517436174371743817439174401744117442174431744417445174461744717448174491745017451174521745317454174551745617457174581745917460174611746217463174641746517466174671746817469174701747117472174731747417475174761747717478174791748017481174821748317484174851748617487174881748917490174911749217493174941749517496174971749817499175001750117502175031750417505175061750717508175091751017511175121751317514175151751617517175181751917520175211752217523175241752517526175271752817529175301753117532175331753417535175361753717538175391754017541175421754317544175451754617547175481754917550175511755217553175541755517556175571755817559175601756117562175631756417565175661756717568175691757017571175721757317574175751757617577175781757917580175811758217583175841758517586175871758817589175901759117592175931759417595175961759717598175991760017601176021760317604176051760617607176081760917610176111761217613176141761517616176171761817619176201762117622176231762417625176261762717628176291763017631176321763317634176351763617637176381763917640176411764217643176441764517646176471764817649176501765117652176531765417655176561765717658176591766017661176621766317664176651766617667176681766917670176711767217673176741767517676176771767817679176801768117682176831768417685176861768717688176891769017691176921769317694176951769617697176981769917700177011770217703177041770517706177071770817709177101771117712177131771417715177161771717718177191772017721177221772317724177251772617727177281772917730177311773217733177341773517736177371773817739177401774117742177431774417745177461774717748177491775017751177521775317754177551775617757177581775917760177611776217763177641776517766177671776817769177701777117772177731777417775177761777717778177791778017781177821778317784177851778617787177881778917790177911779217793177941779517796177971779817799178001780117802178031780417805178061780717808178091781017811178121781317814178151781617817178181781917820178211782217823178241782517826178271782817829178301783117832178331783417835178361783717838178391784017841178421784317844178451784617847178481784917850178511785217853178541785517856178571785817859178601786117862178631786417865178661786717868178691787017871178721787317874178751787617877178781787917880178811788217883178841788517886178871788817889178901789117892178931789417895178961789717898178991790017901179021790317904179051790617907179081790917910179111791217913179141791517916179171791817919179201792117922179231792417925179261792717928179291793017931179321793317934179351793617937179381793917940179411794217943179441794517946179471794817949179501795117952179531795417955179561795717958179591796017961179621796317964179651796617967179681796917970179711797217973179741797517976179771797817979179801798117982179831798417985179861798717988179891799017991179921799317994179951799617997179981799918000180011800218003180041800518006180071800818009180101801118012180131801418015180161801718018180191802018021180221802318024180251802618027180281802918030180311803218033180341803518036180371803818039180401804118042180431804418045180461804718048180491805018051180521805318054180551805618057180581805918060180611806218063180641806518066180671806818069180701807118072180731807418075180761807718078180791808018081180821808318084180851808618087180881808918090180911809218093180941809518096180971809818099181001810118102181031810418105181061810718108181091811018111181121811318114181151811618117181181811918120181211812218123181241812518126181271812818129181301813118132181331813418135181361813718138181391814018141181421814318144181451814618147181481814918150181511815218153181541815518156181571815818159181601816118162181631816418165181661816718168181691817018171181721817318174181751817618177181781817918180181811818218183181841818518186181871818818189181901819118192181931819418195181961819718198181991820018201182021820318204182051820618207182081820918210182111821218213182141821518216182171821818219182201822118222182231822418225182261822718228182291823018231182321823318234182351823618237182381823918240182411824218243182441824518246182471824818249182501825118252182531825418255182561825718258182591826018261182621826318264182651826618267182681826918270182711827218273182741827518276182771827818279182801828118282182831828418285182861828718288182891829018291182921829318294182951829618297182981829918300183011830218303183041830518306183071830818309183101831118312183131831418315183161831718318183191832018321183221832318324183251832618327183281832918330183311833218333183341833518336183371833818339183401834118342183431834418345183461834718348183491835018351183521835318354183551835618357183581835918360183611836218363183641836518366183671836818369183701837118372183731837418375183761837718378183791838018381183821838318384183851838618387183881838918390183911839218393183941839518396183971839818399184001840118402184031840418405184061840718408184091841018411184121841318414184151841618417184181841918420184211842218423184241842518426184271842818429184301843118432184331843418435184361843718438184391844018441184421844318444184451844618447184481844918450184511845218453184541845518456184571845818459184601846118462184631846418465184661846718468184691847018471184721847318474184751847618477184781847918480184811848218483184841848518486184871848818489184901849118492184931849418495184961849718498184991850018501185021850318504185051850618507185081850918510185111851218513185141851518516185171851818519185201852118522185231852418525185261852718528185291853018531185321853318534185351853618537185381853918540185411854218543185441854518546185471854818549185501855118552185531855418555185561855718558185591856018561185621856318564185651856618567185681856918570185711857218573185741857518576185771857818579185801858118582185831858418585185861858718588185891859018591185921859318594185951859618597185981859918600186011860218603186041860518606186071860818609186101861118612186131861418615186161861718618186191862018621186221862318624186251862618627186281862918630186311863218633186341863518636186371863818639186401864118642186431864418645186461864718648186491865018651186521865318654186551865618657186581865918660186611866218663186641866518666186671866818669186701867118672186731867418675186761867718678186791868018681186821868318684186851868618687186881868918690186911869218693186941869518696186971869818699187001870118702187031870418705187061870718708187091871018711187121871318714187151871618717187181871918720187211872218723187241872518726187271872818729187301873118732187331873418735187361873718738187391874018741187421874318744187451874618747187481874918750187511875218753187541875518756187571875818759187601876118762187631876418765187661876718768187691877018771187721877318774187751877618777187781877918780187811878218783187841878518786187871878818789187901879118792187931879418795187961879718798187991880018801188021880318804188051880618807188081880918810188111881218813188141881518816188171881818819188201882118822188231882418825188261882718828188291883018831188321883318834188351883618837188381883918840188411884218843188441884518846188471884818849188501885118852188531885418855188561885718858188591886018861188621886318864188651886618867188681886918870188711887218873188741887518876188771887818879188801888118882188831888418885188861888718888188891889018891188921889318894188951889618897188981889918900189011890218903189041890518906189071890818909189101891118912189131891418915189161891718918189191892018921189221892318924189251892618927189281892918930189311893218933189341893518936189371893818939189401894118942189431894418945189461894718948189491895018951189521895318954189551895618957189581895918960189611896218963189641896518966189671896818969189701897118972189731897418975189761897718978189791898018981189821898318984189851898618987189881898918990189911899218993189941899518996189971899818999190001900119002190031900419005190061900719008190091901019011190121901319014190151901619017190181901919020190211902219023190241902519026190271902819029190301903119032190331903419035190361903719038190391904019041190421904319044190451904619047190481904919050190511905219053190541905519056190571905819059190601906119062190631906419065190661906719068190691907019071190721907319074190751907619077190781907919080190811908219083190841908519086190871908819089190901909119092190931909419095190961909719098190991910019101191021910319104191051910619107191081910919110191111911219113191141911519116191171911819119191201912119122191231912419125191261912719128191291913019131191321913319134191351913619137191381913919140191411914219143191441914519146191471914819149191501915119152191531915419155191561915719158191591916019161191621916319164191651916619167191681916919170191711917219173191741917519176191771917819179191801918119182191831918419185191861918719188191891919019191191921919319194191951919619197191981919919200192011920219203192041920519206192071920819209192101921119212192131921419215192161921719218192191922019221192221922319224192251922619227192281922919230192311923219233192341923519236192371923819239192401924119242192431924419245192461924719248192491925019251192521925319254192551925619257192581925919260192611926219263192641926519266192671926819269192701927119272192731927419275192761927719278192791928019281192821928319284192851928619287192881928919290192911929219293192941929519296192971929819299193001930119302193031930419305193061930719308193091931019311193121931319314193151931619317193181931919320193211932219323193241932519326193271932819329193301933119332193331933419335193361933719338193391934019341193421934319344193451934619347193481934919350193511935219353193541935519356193571935819359193601936119362193631936419365193661936719368193691937019371193721937319374193751937619377193781937919380193811938219383193841938519386193871938819389193901939119392193931939419395193961939719398193991940019401194021940319404194051940619407194081940919410194111941219413194141941519416194171941819419194201942119422194231942419425194261942719428194291943019431194321943319434194351943619437194381943919440194411944219443194441944519446194471944819449194501945119452194531945419455194561945719458194591946019461194621946319464194651946619467194681946919470194711947219473194741947519476194771947819479194801948119482194831948419485194861948719488194891949019491194921949319494194951949619497194981949919500195011950219503195041950519506195071950819509195101951119512195131951419515195161951719518195191952019521195221952319524195251952619527195281952919530195311953219533195341953519536195371953819539195401954119542195431954419545195461954719548195491955019551195521955319554195551955619557195581955919560195611956219563195641956519566195671956819569195701957119572195731957419575195761957719578195791958019581195821958319584195851958619587195881958919590195911959219593195941959519596195971959819599196001960119602196031960419605196061960719608196091961019611196121961319614196151961619617196181961919620196211962219623196241962519626196271962819629196301963119632196331963419635196361963719638196391964019641196421964319644196451964619647196481964919650196511965219653196541965519656196571965819659196601966119662196631966419665196661966719668196691967019671196721967319674196751967619677196781967919680196811968219683196841968519686196871968819689196901969119692196931969419695196961969719698196991970019701197021970319704197051970619707197081970919710197111971219713197141971519716197171971819719197201972119722197231972419725197261972719728197291973019731197321973319734197351973619737197381973919740197411974219743197441974519746197471974819749197501975119752197531975419755197561975719758197591976019761197621976319764197651976619767197681976919770197711977219773197741977519776197771977819779197801978119782197831978419785197861978719788197891979019791197921979319794197951979619797197981979919800198011980219803198041980519806198071980819809198101981119812198131981419815198161981719818198191982019821198221982319824198251982619827198281982919830198311983219833198341983519836198371983819839198401984119842198431984419845198461984719848198491985019851198521985319854198551985619857198581985919860198611986219863198641986519866198671986819869198701987119872198731987419875198761987719878198791988019881198821988319884198851988619887198881988919890198911989219893198941989519896198971989819899199001990119902199031990419905199061990719908199091991019911199121991319914199151991619917199181991919920199211992219923199241992519926199271992819929199301993119932199331993419935199361993719938199391994019941199421994319944199451994619947199481994919950199511995219953199541995519956199571995819959199601996119962199631996419965199661996719968199691997019971199721997319974199751997619977199781997919980199811998219983199841998519986199871998819989199901999119992199931999419995199961999719998199992000020001200022000320004200052000620007200082000920010200112001220013200142001520016200172001820019200202002120022200232002420025200262002720028200292003020031200322003320034200352003620037200382003920040200412004220043200442004520046200472004820049200502005120052200532005420055200562005720058200592006020061200622006320064200652006620067200682006920070200712007220073200742007520076200772007820079200802008120082200832008420085200862008720088200892009020091200922009320094200952009620097200982009920100201012010220103201042010520106201072010820109201102011120112201132011420115201162011720118201192012020121201222012320124201252012620127201282012920130201312013220133201342013520136201372013820139201402014120142201432014420145201462014720148201492015020151201522015320154201552015620157201582015920160201612016220163201642016520166201672016820169201702017120172201732017420175201762017720178201792018020181201822018320184201852018620187201882018920190201912019220193201942019520196201972019820199202002020120202202032020420205202062020720208202092021020211202122021320214202152021620217202182021920220202212022220223202242022520226202272022820229202302023120232202332023420235202362023720238202392024020241202422024320244202452024620247202482024920250202512025220253202542025520256202572025820259202602026120262202632026420265202662026720268202692027020271202722027320274202752027620277202782027920280202812028220283202842028520286202872028820289202902029120292202932029420295202962029720298202992030020301203022030320304203052030620307203082030920310203112031220313203142031520316203172031820319203202032120322203232032420325203262032720328203292033020331203322033320334203352033620337203382033920340203412034220343203442034520346203472034820349203502035120352203532035420355203562035720358203592036020361203622036320364203652036620367203682036920370203712037220373203742037520376203772037820379203802038120382203832038420385203862038720388203892039020391203922039320394203952039620397203982039920400204012040220403204042040520406204072040820409204102041120412204132041420415204162041720418204192042020421204222042320424204252042620427204282042920430204312043220433204342043520436204372043820439204402044120442204432044420445204462044720448204492045020451204522045320454204552045620457204582045920460204612046220463204642046520466204672046820469204702047120472204732047420475204762047720478204792048020481204822048320484204852048620487204882048920490204912049220493204942049520496204972049820499205002050120502205032050420505205062050720508205092051020511205122051320514205152051620517205182051920520205212052220523205242052520526205272052820529205302053120532205332053420535205362053720538205392054020541205422054320544205452054620547205482054920550205512055220553205542055520556205572055820559205602056120562205632056420565205662056720568205692057020571205722057320574205752057620577205782057920580205812058220583205842058520586205872058820589205902059120592205932059420595205962059720598205992060020601206022060320604206052060620607206082060920610206112061220613206142061520616206172061820619206202062120622206232062420625206262062720628206292063020631206322063320634206352063620637206382063920640206412064220643206442064520646206472064820649206502065120652206532065420655206562065720658206592066020661206622066320664206652066620667206682066920670206712067220673206742067520676206772067820679206802068120682206832068420685206862068720688206892069020691206922069320694206952069620697206982069920700207012070220703207042070520706207072070820709207102071120712207132071420715207162071720718207192072020721207222072320724207252072620727207282072920730207312073220733207342073520736207372073820739207402074120742207432074420745207462074720748207492075020751207522075320754207552075620757207582075920760207612076220763207642076520766207672076820769207702077120772207732077420775207762077720778207792078020781207822078320784207852078620787207882078920790207912079220793207942079520796207972079820799208002080120802208032080420805208062080720808208092081020811208122081320814208152081620817208182081920820208212082220823208242082520826208272082820829208302083120832208332083420835208362083720838208392084020841208422084320844208452084620847208482084920850208512085220853208542085520856208572085820859208602086120862208632086420865208662086720868208692087020871208722087320874208752087620877208782087920880208812088220883208842088520886208872088820889208902089120892208932089420895208962089720898208992090020901209022090320904209052090620907209082090920910209112091220913209142091520916209172091820919209202092120922209232092420925209262092720928209292093020931209322093320934209352093620937209382093920940209412094220943209442094520946209472094820949209502095120952209532095420955209562095720958209592096020961209622096320964209652096620967209682096920970209712097220973209742097520976209772097820979209802098120982209832098420985209862098720988209892099020991209922099320994209952099620997209982099921000210012100221003210042100521006210072100821009210102101121012210132101421015210162101721018210192102021021210222102321024210252102621027210282102921030210312103221033210342103521036210372103821039210402104121042210432104421045210462104721048210492105021051210522105321054210552105621057210582105921060210612106221063210642106521066210672106821069210702107121072210732107421075210762107721078210792108021081210822108321084210852108621087210882108921090210912109221093210942109521096210972109821099211002110121102211032110421105211062110721108211092111021111211122111321114211152111621117211182111921120211212112221123211242112521126211272112821129211302113121132211332113421135211362113721138211392114021141211422114321144211452114621147211482114921150211512115221153211542115521156211572115821159211602116121162211632116421165211662116721168211692117021171211722117321174211752117621177211782117921180211812118221183211842118521186211872118821189211902119121192211932119421195211962119721198211992120021201212022120321204212052120621207212082120921210212112121221213212142121521216212172121821219212202122121222212232122421225212262122721228212292123021231212322123321234212352123621237212382123921240212412124221243212442124521246212472124821249212502125121252212532125421255212562125721258212592126021261212622126321264212652126621267212682126921270212712127221273212742127521276212772127821279212802128121282212832128421285212862128721288212892129021291212922129321294212952129621297212982129921300213012130221303213042130521306213072130821309213102131121312213132131421315213162131721318213192132021321213222132321324213252132621327213282132921330213312133221333213342133521336213372133821339213402134121342213432134421345213462134721348213492135021351213522135321354213552135621357213582135921360213612136221363213642136521366213672136821369213702137121372213732137421375213762137721378213792138021381213822138321384213852138621387213882138921390213912139221393213942139521396213972139821399214002140121402214032140421405214062140721408214092141021411214122141321414214152141621417214182141921420214212142221423214242142521426214272142821429214302143121432214332143421435214362143721438214392144021441214422144321444214452144621447214482144921450214512145221453214542145521456214572145821459214602146121462214632146421465214662146721468214692147021471214722147321474214752147621477214782147921480214812148221483214842148521486214872148821489214902149121492214932149421495214962149721498214992150021501215022150321504215052150621507215082150921510215112151221513215142151521516215172151821519215202152121522215232152421525215262152721528215292153021531215322153321534215352153621537215382153921540215412154221543215442154521546215472154821549215502155121552215532155421555215562155721558215592156021561215622156321564215652156621567215682156921570215712157221573215742157521576215772157821579215802158121582215832158421585215862158721588215892159021591215922159321594215952159621597215982159921600216012160221603216042160521606216072160821609216102161121612216132161421615216162161721618216192162021621216222162321624216252162621627216282162921630216312163221633216342163521636216372163821639216402164121642216432164421645216462164721648216492165021651216522165321654216552165621657216582165921660216612166221663216642166521666216672166821669216702167121672216732167421675216762167721678216792168021681216822168321684216852168621687216882168921690216912169221693216942169521696216972169821699217002170121702217032170421705217062170721708217092171021711217122171321714217152171621717217182171921720217212172221723217242172521726217272172821729217302173121732217332173421735217362173721738217392174021741217422174321744217452174621747217482174921750217512175221753217542175521756217572175821759217602176121762217632176421765217662176721768217692177021771217722177321774217752177621777217782177921780217812178221783217842178521786217872178821789217902179121792217932179421795217962179721798217992180021801218022180321804218052180621807218082180921810218112181221813218142181521816218172181821819218202182121822218232182421825218262182721828218292183021831218322183321834218352183621837218382183921840218412184221843218442184521846218472184821849218502185121852218532185421855218562185721858218592186021861218622186321864218652186621867218682186921870218712187221873218742187521876218772187821879218802188121882218832188421885218862188721888218892189021891218922189321894218952189621897218982189921900219012190221903219042190521906219072190821909219102191121912219132191421915219162191721918219192192021921219222192321924219252192621927219282192921930219312193221933219342193521936219372193821939219402194121942219432194421945219462194721948219492195021951219522195321954219552195621957219582195921960219612196221963219642196521966219672196821969219702197121972219732197421975219762197721978219792198021981219822198321984219852198621987219882198921990219912199221993219942199521996219972199821999220002200122002220032200422005220062200722008220092201022011220122201322014220152201622017220182201922020220212202222023220242202522026220272202822029220302203122032220332203422035220362203722038220392204022041220422204322044220452204622047220482204922050220512205222053220542205522056220572205822059220602206122062220632206422065220662206722068220692207022071220722207322074220752207622077220782207922080220812208222083220842208522086220872208822089220902209122092220932209422095220962209722098220992210022101221022210322104221052210622107221082210922110221112211222113221142211522116221172211822119221202212122122221232212422125221262212722128221292213022131221322213322134221352213622137221382213922140221412214222143221442214522146221472214822149221502215122152221532215422155221562215722158221592216022161221622216322164221652216622167221682216922170221712217222173221742217522176221772217822179221802218122182221832218422185221862218722188221892219022191221922219322194221952219622197221982219922200222012220222203222042220522206222072220822209222102221122212222132221422215222162221722218222192222022221222222222322224222252222622227222282222922230222312223222233222342223522236222372223822239222402224122242222432224422245222462224722248222492225022251222522225322254222552225622257222582225922260222612226222263222642226522266222672226822269222702227122272222732227422275222762227722278222792228022281222822228322284222852228622287222882228922290222912229222293222942229522296222972229822299223002230122302223032230422305223062230722308223092231022311223122231322314223152231622317223182231922320223212232222323223242232522326223272232822329223302233122332223332233422335223362233722338223392234022341223422234322344223452234622347223482234922350223512235222353223542235522356223572235822359223602236122362223632236422365223662236722368223692237022371223722237322374223752237622377223782237922380223812238222383223842238522386223872238822389223902239122392223932239422395223962239722398223992240022401224022240322404224052240622407224082240922410224112241222413224142241522416224172241822419224202242122422224232242422425224262242722428224292243022431224322243322434224352243622437224382243922440224412244222443224442244522446224472244822449224502245122452224532245422455224562245722458224592246022461224622246322464224652246622467224682246922470224712247222473224742247522476224772247822479224802248122482224832248422485224862248722488224892249022491224922249322494224952249622497224982249922500225012250222503225042250522506225072250822509225102251122512225132251422515225162251722518225192252022521225222252322524225252252622527225282252922530225312253222533225342253522536225372253822539225402254122542225432254422545225462254722548225492255022551225522255322554225552255622557225582255922560225612256222563225642256522566225672256822569225702257122572225732257422575225762257722578225792258022581225822258322584225852258622587225882258922590225912259222593225942259522596225972259822599226002260122602226032260422605226062260722608226092261022611226122261322614226152261622617226182261922620226212262222623226242262522626226272262822629226302263122632226332263422635226362263722638226392264022641226422264322644226452264622647226482264922650226512265222653226542265522656226572265822659226602266122662226632266422665226662266722668226692267022671226722267322674226752267622677226782267922680226812268222683226842268522686226872268822689226902269122692226932269422695226962269722698226992270022701227022270322704227052270622707227082270922710227112271222713227142271522716227172271822719227202272122722227232272422725227262272722728227292273022731227322273322734227352273622737227382273922740227412274222743227442274522746227472274822749227502275122752227532275422755227562275722758227592276022761227622276322764227652276622767227682276922770227712277222773227742277522776227772277822779227802278122782227832278422785227862278722788227892279022791227922279322794227952279622797227982279922800228012280222803228042280522806228072280822809228102281122812228132281422815228162281722818228192282022821228222282322824228252282622827228282282922830228312283222833228342283522836228372283822839228402284122842228432284422845228462284722848228492285022851228522285322854228552285622857228582285922860228612286222863228642286522866228672286822869228702287122872228732287422875228762287722878228792288022881228822288322884228852288622887228882288922890228912289222893228942289522896228972289822899229002290122902229032290422905229062290722908229092291022911229122291322914229152291622917229182291922920229212292222923229242292522926229272292822929229302293122932229332293422935229362293722938229392294022941229422294322944229452294622947229482294922950229512295222953229542295522956229572295822959229602296122962229632296422965229662296722968229692297022971229722297322974229752297622977229782297922980229812298222983229842298522986229872298822989229902299122992229932299422995229962299722998229992300023001230022300323004230052300623007230082300923010230112301223013230142301523016230172301823019230202302123022230232302423025230262302723028230292303023031230322303323034230352303623037230382303923040230412304223043230442304523046230472304823049230502305123052230532305423055230562305723058230592306023061230622306323064230652306623067230682306923070230712307223073230742307523076230772307823079230802308123082230832308423085230862308723088230892309023091230922309323094230952309623097230982309923100231012310223103231042310523106231072310823109231102311123112231132311423115231162311723118231192312023121231222312323124231252312623127231282312923130231312313223133231342313523136231372313823139231402314123142231432314423145231462314723148231492315023151231522315323154231552315623157231582315923160231612316223163231642316523166231672316823169231702317123172231732317423175231762317723178231792318023181231822318323184231852318623187231882318923190231912319223193231942319523196231972319823199232002320123202232032320423205232062320723208232092321023211232122321323214232152321623217232182321923220232212322223223232242322523226232272322823229232302323123232232332323423235232362323723238232392324023241232422324323244232452324623247232482324923250232512325223253232542325523256232572325823259232602326123262232632326423265232662326723268232692327023271232722327323274232752327623277232782327923280232812328223283232842328523286232872328823289232902329123292232932329423295232962329723298232992330023301233022330323304233052330623307233082330923310233112331223313233142331523316233172331823319233202332123322233232332423325233262332723328233292333023331233322333323334233352333623337233382333923340233412334223343233442334523346233472334823349233502335123352233532335423355233562335723358233592336023361233622336323364233652336623367233682336923370233712337223373233742337523376233772337823379233802338123382233832338423385233862338723388233892339023391233922339323394233952339623397233982339923400234012340223403234042340523406234072340823409234102341123412234132341423415234162341723418234192342023421234222342323424234252342623427234282342923430234312343223433234342343523436234372343823439234402344123442234432344423445234462344723448234492345023451234522345323454234552345623457234582345923460234612346223463234642346523466234672346823469234702347123472234732347423475234762347723478234792348023481234822348323484234852348623487234882348923490234912349223493234942349523496234972349823499235002350123502235032350423505235062350723508235092351023511235122351323514235152351623517235182351923520235212352223523235242352523526235272352823529235302353123532235332353423535235362353723538235392354023541235422354323544235452354623547235482354923550235512355223553235542355523556235572355823559235602356123562235632356423565235662356723568235692357023571235722357323574235752357623577235782357923580235812358223583235842358523586235872358823589235902359123592235932359423595235962359723598235992360023601236022360323604236052360623607236082360923610236112361223613236142361523616236172361823619236202362123622236232362423625236262362723628236292363023631236322363323634236352363623637236382363923640236412364223643236442364523646236472364823649236502365123652236532365423655236562365723658236592366023661236622366323664236652366623667236682366923670236712367223673236742367523676236772367823679236802368123682236832368423685236862368723688236892369023691236922369323694236952369623697236982369923700237012370223703237042370523706237072370823709237102371123712237132371423715237162371723718237192372023721237222372323724237252372623727237282372923730237312373223733237342373523736237372373823739237402374123742237432374423745237462374723748237492375023751237522375323754237552375623757237582375923760237612376223763237642376523766237672376823769237702377123772237732377423775237762377723778237792378023781237822378323784237852378623787237882378923790237912379223793237942379523796237972379823799238002380123802238032380423805238062380723808238092381023811238122381323814238152381623817238182381923820238212382223823238242382523826238272382823829238302383123832238332383423835238362383723838238392384023841238422384323844238452384623847238482384923850238512385223853238542385523856238572385823859238602386123862238632386423865238662386723868238692387023871238722387323874238752387623877238782387923880238812388223883238842388523886238872388823889238902389123892238932389423895238962389723898238992390023901239022390323904239052390623907239082390923910239112391223913239142391523916239172391823919239202392123922239232392423925239262392723928239292393023931239322393323934239352393623937239382393923940239412394223943239442394523946239472394823949239502395123952239532395423955239562395723958239592396023961239622396323964239652396623967239682396923970239712397223973239742397523976239772397823979239802398123982239832398423985239862398723988239892399023991239922399323994239952399623997239982399924000240012400224003240042400524006240072400824009240102401124012240132401424015240162401724018240192402024021240222402324024240252402624027240282402924030240312403224033240342403524036240372403824039240402404124042240432404424045240462404724048240492405024051240522405324054240552405624057240582405924060240612406224063240642406524066240672406824069240702407124072240732407424075240762407724078240792408024081240822408324084240852408624087240882408924090240912409224093240942409524096240972409824099241002410124102241032410424105241062410724108241092411024111241122411324114241152411624117241182411924120241212412224123241242412524126241272412824129241302413124132241332413424135241362413724138241392414024141241422414324144241452414624147241482414924150241512415224153241542415524156241572415824159241602416124162241632416424165241662416724168241692417024171241722417324174241752417624177241782417924180241812418224183241842418524186241872418824189241902419124192241932419424195241962419724198241992420024201242022420324204242052420624207242082420924210242112421224213242142421524216242172421824219242202422124222242232422424225242262422724228242292423024231242322423324234242352423624237242382423924240242412424224243242442424524246242472424824249242502425124252242532425424255242562425724258242592426024261242622426324264242652426624267242682426924270242712427224273242742427524276242772427824279242802428124282242832428424285242862428724288242892429024291242922429324294242952429624297242982429924300243012430224303243042430524306243072430824309243102431124312243132431424315243162431724318243192432024321243222432324324243252432624327243282432924330243312433224333243342433524336243372433824339243402434124342243432434424345243462434724348243492435024351243522435324354243552435624357243582435924360243612436224363243642436524366243672436824369243702437124372243732437424375243762437724378243792438024381243822438324384243852438624387243882438924390243912439224393243942439524396243972439824399244002440124402244032440424405244062440724408244092441024411244122441324414244152441624417244182441924420244212442224423244242442524426244272442824429244302443124432244332443424435244362443724438244392444024441244422444324444244452444624447244482444924450244512445224453244542445524456244572445824459244602446124462244632446424465244662446724468244692447024471244722447324474244752447624477244782447924480244812448224483244842448524486244872448824489244902449124492244932449424495244962449724498244992450024501245022450324504245052450624507245082450924510245112451224513245142451524516245172451824519245202452124522245232452424525245262452724528245292453024531245322453324534245352453624537245382453924540245412454224543245442454524546245472454824549245502455124552245532455424555245562455724558245592456024561245622456324564245652456624567245682456924570245712457224573245742457524576245772457824579245802458124582245832458424585245862458724588245892459024591245922459324594245952459624597245982459924600246012460224603246042460524606246072460824609246102461124612246132461424615246162461724618246192462024621246222462324624246252462624627246282462924630246312463224633246342463524636246372463824639246402464124642246432464424645246462464724648246492465024651246522465324654246552465624657246582465924660246612466224663246642466524666246672466824669246702467124672246732467424675246762467724678246792468024681246822468324684246852468624687246882468924690246912469224693246942469524696246972469824699247002470124702247032470424705247062470724708247092471024711247122471324714247152471624717247182471924720247212472224723247242472524726247272472824729247302473124732247332473424735247362473724738247392474024741247422474324744247452474624747247482474924750247512475224753247542475524756247572475824759247602476124762247632476424765247662476724768247692477024771247722477324774247752477624777247782477924780247812478224783247842478524786247872478824789247902479124792247932479424795247962479724798247992480024801248022480324804248052480624807248082480924810248112481224813248142481524816248172481824819248202482124822248232482424825248262482724828248292483024831248322483324834248352483624837248382483924840248412484224843248442484524846248472484824849248502485124852248532485424855248562485724858248592486024861248622486324864248652486624867248682486924870248712487224873248742487524876248772487824879248802488124882248832488424885248862488724888248892489024891248922489324894248952489624897248982489924900249012490224903249042490524906249072490824909249102491124912249132491424915249162491724918249192492024921249222492324924249252492624927249282492924930249312493224933249342493524936249372493824939249402494124942249432494424945249462494724948249492495024951249522495324954249552495624957249582495924960249612496224963249642496524966249672496824969249702497124972249732497424975249762497724978249792498024981249822498324984249852498624987249882498924990249912499224993249942499524996249972499824999250002500125002250032500425005250062500725008250092501025011250122501325014250152501625017250182501925020250212502225023250242502525026250272502825029250302503125032250332503425035250362503725038250392504025041250422504325044250452504625047250482504925050250512505225053250542505525056250572505825059250602506125062250632506425065250662506725068250692507025071250722507325074250752507625077250782507925080250812508225083250842508525086250872508825089250902509125092250932509425095250962509725098250992510025101251022510325104251052510625107251082510925110251112511225113251142511525116251172511825119251202512125122251232512425125251262512725128251292513025131251322513325134251352513625137251382513925140251412514225143251442514525146251472514825149251502515125152251532515425155251562515725158251592516025161251622516325164251652516625167251682516925170251712517225173251742517525176251772517825179251802518125182251832518425185251862518725188251892519025191251922519325194251952519625197251982519925200252012520225203252042520525206252072520825209252102521125212252132521425215252162521725218252192522025221252222522325224252252522625227252282522925230252312523225233252342523525236252372523825239252402524125242252432524425245252462524725248252492525025251252522525325254252552525625257252582525925260252612526225263252642526525266252672526825269252702527125272252732527425275252762527725278252792528025281252822528325284252852528625287252882528925290252912529225293252942529525296252972529825299253002530125302253032530425305253062530725308253092531025311253122531325314253152531625317253182531925320253212532225323253242532525326253272532825329253302533125332253332533425335253362533725338253392534025341253422534325344253452534625347253482534925350253512535225353253542535525356253572535825359253602536125362253632536425365253662536725368253692537025371253722537325374253752537625377253782537925380253812538225383253842538525386253872538825389253902539125392253932539425395253962539725398253992540025401254022540325404254052540625407254082540925410254112541225413254142541525416254172541825419254202542125422254232542425425254262542725428254292543025431254322543325434254352543625437254382543925440254412544225443254442544525446254472544825449254502545125452254532545425455254562545725458254592546025461254622546325464254652546625467254682546925470254712547225473254742547525476254772547825479254802548125482254832548425485254862548725488254892549025491254922549325494254952549625497254982549925500255012550225503255042550525506255072550825509255102551125512255132551425515255162551725518255192552025521255222552325524255252552625527255282552925530255312553225533255342553525536255372553825539255402554125542255432554425545255462554725548255492555025551255522555325554255552555625557255582555925560255612556225563255642556525566255672556825569255702557125572255732557425575255762557725578255792558025581255822558325584255852558625587255882558925590255912559225593255942559525596255972559825599256002560125602256032560425605256062560725608256092561025611256122561325614256152561625617256182561925620256212562225623256242562525626256272562825629256302563125632256332563425635256362563725638256392564025641256422564325644256452564625647256482564925650256512565225653256542565525656256572565825659256602566125662256632566425665256662566725668256692567025671256722567325674256752567625677256782567925680256812568225683256842568525686256872568825689256902569125692256932569425695256962569725698256992570025701257022570325704257052570625707257082570925710257112571225713257142571525716257172571825719257202572125722257232572425725257262572725728257292573025731257322573325734257352573625737257382573925740257412574225743257442574525746257472574825749257502575125752257532575425755257562575725758257592576025761257622576325764257652576625767257682576925770257712577225773257742577525776257772577825779257802578125782257832578425785257862578725788257892579025791257922579325794257952579625797257982579925800258012580225803258042580525806258072580825809258102581125812258132581425815258162581725818258192582025821258222582325824258252582625827258282582925830258312583225833258342583525836258372583825839258402584125842258432584425845258462584725848258492585025851258522585325854258552585625857258582585925860258612586225863258642586525866258672586825869258702587125872258732587425875258762587725878258792588025881258822588325884258852588625887258882588925890258912589225893258942589525896258972589825899259002590125902259032590425905259062590725908259092591025911259122591325914259152591625917259182591925920259212592225923259242592525926259272592825929259302593125932259332593425935259362593725938259392594025941259422594325944259452594625947259482594925950259512595225953259542595525956259572595825959259602596125962259632596425965259662596725968259692597025971259722597325974259752597625977259782597925980259812598225983259842598525986259872598825989259902599125992259932599425995259962599725998259992600026001260022600326004260052600626007260082600926010260112601226013260142601526016260172601826019260202602126022260232602426025260262602726028260292603026031260322603326034260352603626037260382603926040260412604226043260442604526046260472604826049260502605126052260532605426055260562605726058260592606026061260622606326064260652606626067260682606926070260712607226073260742607526076260772607826079260802608126082260832608426085260862608726088260892609026091260922609326094260952609626097260982609926100261012610226103261042610526106261072610826109261102611126112261132611426115261162611726118261192612026121261222612326124261252612626127261282612926130261312613226133261342613526136261372613826139261402614126142261432614426145261462614726148261492615026151261522615326154261552615626157261582615926160261612616226163261642616526166261672616826169261702617126172261732617426175261762617726178261792618026181261822618326184261852618626187261882618926190261912619226193261942619526196261972619826199262002620126202262032620426205262062620726208262092621026211262122621326214262152621626217262182621926220262212622226223262242622526226262272622826229262302623126232262332623426235262362623726238262392624026241262422624326244262452624626247262482624926250262512625226253262542625526256262572625826259262602626126262262632626426265262662626726268262692627026271262722627326274262752627626277262782627926280262812628226283262842628526286262872628826289262902629126292262932629426295262962629726298262992630026301263022630326304263052630626307263082630926310263112631226313263142631526316263172631826319263202632126322263232632426325263262632726328263292633026331263322633326334263352633626337263382633926340263412634226343263442634526346263472634826349263502635126352263532635426355263562635726358263592636026361263622636326364263652636626367263682636926370263712637226373263742637526376263772637826379263802638126382263832638426385263862638726388263892639026391263922639326394263952639626397263982639926400264012640226403264042640526406264072640826409264102641126412264132641426415264162641726418264192642026421264222642326424264252642626427264282642926430264312643226433264342643526436264372643826439264402644126442264432644426445264462644726448264492645026451264522645326454264552645626457264582645926460264612646226463264642646526466264672646826469264702647126472264732647426475264762647726478264792648026481264822648326484264852648626487264882648926490264912649226493264942649526496264972649826499265002650126502265032650426505265062650726508265092651026511265122651326514265152651626517265182651926520265212652226523265242652526526265272652826529265302653126532265332653426535265362653726538265392654026541265422654326544265452654626547265482654926550265512655226553265542655526556265572655826559265602656126562265632656426565265662656726568265692657026571265722657326574265752657626577265782657926580265812658226583265842658526586265872658826589265902659126592265932659426595265962659726598265992660026601266022660326604266052660626607266082660926610266112661226613266142661526616266172661826619266202662126622266232662426625266262662726628266292663026631266322663326634266352663626637266382663926640266412664226643266442664526646266472664826649266502665126652266532665426655266562665726658266592666026661266622666326664266652666626667266682666926670266712667226673266742667526676266772667826679266802668126682266832668426685266862668726688266892669026691266922669326694266952669626697266982669926700267012670226703267042670526706267072670826709267102671126712267132671426715267162671726718267192672026721267222672326724267252672626727267282672926730267312673226733267342673526736267372673826739267402674126742267432674426745267462674726748267492675026751267522675326754267552675626757267582675926760267612676226763267642676526766267672676826769267702677126772267732677426775267762677726778267792678026781267822678326784267852678626787267882678926790267912679226793267942679526796267972679826799268002680126802268032680426805268062680726808268092681026811268122681326814268152681626817268182681926820268212682226823268242682526826268272682826829268302683126832268332683426835268362683726838268392684026841268422684326844268452684626847268482684926850268512685226853268542685526856268572685826859268602686126862268632686426865268662686726868268692687026871268722687326874268752687626877268782687926880268812688226883268842688526886268872688826889268902689126892268932689426895268962689726898268992690026901269022690326904269052690626907269082690926910269112691226913269142691526916269172691826919269202692126922269232692426925269262692726928269292693026931269322693326934269352693626937269382693926940269412694226943269442694526946269472694826949269502695126952269532695426955269562695726958269592696026961269622696326964269652696626967269682696926970269712697226973269742697526976269772697826979269802698126982269832698426985269862698726988269892699026991269922699326994269952699626997269982699927000270012700227003270042700527006270072700827009270102701127012270132701427015270162701727018270192702027021270222702327024270252702627027270282702927030270312703227033270342703527036270372703827039270402704127042270432704427045270462704727048270492705027051270522705327054270552705627057270582705927060270612706227063270642706527066270672706827069270702707127072270732707427075270762707727078270792708027081270822708327084270852708627087270882708927090270912709227093270942709527096270972709827099271002710127102271032710427105271062710727108271092711027111271122711327114271152711627117271182711927120271212712227123271242712527126271272712827129271302713127132271332713427135271362713727138271392714027141271422714327144271452714627147271482714927150271512715227153271542715527156271572715827159271602716127162271632716427165271662716727168271692717027171271722717327174271752717627177271782717927180271812718227183271842718527186271872718827189271902719127192271932719427195271962719727198271992720027201272022720327204272052720627207272082720927210272112721227213272142721527216272172721827219272202722127222272232722427225272262722727228272292723027231272322723327234272352723627237272382723927240272412724227243272442724527246272472724827249272502725127252272532725427255272562725727258272592726027261272622726327264272652726627267272682726927270272712727227273272742727527276272772727827279272802728127282272832728427285272862728727288272892729027291272922729327294272952729627297272982729927300273012730227303273042730527306273072730827309273102731127312273132731427315273162731727318273192732027321273222732327324273252732627327273282732927330273312733227333273342733527336273372733827339273402734127342273432734427345273462734727348273492735027351273522735327354273552735627357273582735927360273612736227363273642736527366273672736827369273702737127372273732737427375273762737727378273792738027381273822738327384273852738627387273882738927390273912739227393273942739527396273972739827399274002740127402274032740427405274062740727408274092741027411274122741327414274152741627417274182741927420274212742227423274242742527426274272742827429274302743127432274332743427435274362743727438274392744027441274422744327444274452744627447274482744927450274512745227453274542745527456274572745827459274602746127462274632746427465274662746727468274692747027471274722747327474274752747627477274782747927480274812748227483274842748527486274872748827489274902749127492274932749427495274962749727498274992750027501275022750327504275052750627507275082750927510275112751227513275142751527516275172751827519275202752127522275232752427525275262752727528275292753027531275322753327534275352753627537275382753927540275412754227543275442754527546275472754827549275502755127552275532755427555275562755727558275592756027561275622756327564275652756627567275682756927570275712757227573275742757527576275772757827579275802758127582275832758427585275862758727588275892759027591275922759327594275952759627597275982759927600276012760227603276042760527606276072760827609276102761127612276132761427615276162761727618276192762027621276222762327624276252762627627276282762927630276312763227633276342763527636276372763827639276402764127642276432764427645276462764727648276492765027651276522765327654276552765627657276582765927660276612766227663276642766527666276672766827669276702767127672276732767427675276762767727678276792768027681276822768327684276852768627687276882768927690276912769227693276942769527696276972769827699277002770127702277032770427705277062770727708277092771027711277122771327714277152771627717277182771927720277212772227723277242772527726277272772827729277302773127732277332773427735277362773727738277392774027741277422774327744277452774627747277482774927750277512775227753277542775527756277572775827759277602776127762277632776427765277662776727768277692777027771277722777327774277752777627777277782777927780277812778227783277842778527786277872778827789277902779127792277932779427795277962779727798277992780027801278022780327804278052780627807278082780927810278112781227813278142781527816278172781827819278202782127822278232782427825278262782727828278292783027831278322783327834278352783627837278382783927840278412784227843278442784527846278472784827849278502785127852278532785427855278562785727858278592786027861278622786327864278652786627867278682786927870278712787227873278742787527876278772787827879278802788127882278832788427885278862788727888278892789027891278922789327894278952789627897278982789927900279012790227903279042790527906279072790827909279102791127912279132791427915279162791727918279192792027921279222792327924279252792627927279282792927930279312793227933279342793527936279372793827939279402794127942279432794427945279462794727948279492795027951279522795327954279552795627957279582795927960279612796227963279642796527966279672796827969279702797127972279732797427975279762797727978279792798027981279822798327984279852798627987279882798927990279912799227993279942799527996279972799827999280002800128002280032800428005280062800728008280092801028011280122801328014280152801628017280182801928020280212802228023280242802528026280272802828029280302803128032280332803428035280362803728038280392804028041280422804328044280452804628047280482804928050280512805228053280542805528056280572805828059280602806128062280632806428065280662806728068280692807028071280722807328074280752807628077280782807928080280812808228083280842808528086280872808828089280902809128092280932809428095280962809728098280992810028101281022810328104281052810628107281082810928110281112811228113281142811528116281172811828119281202812128122281232812428125281262812728128281292813028131281322813328134281352813628137281382813928140281412814228143281442814528146281472814828149281502815128152281532815428155281562815728158281592816028161281622816328164281652816628167281682816928170281712817228173281742817528176281772817828179281802818128182281832818428185281862818728188281892819028191281922819328194281952819628197281982819928200282012820228203282042820528206282072820828209282102821128212282132821428215282162821728218282192822028221282222822328224282252822628227282282822928230282312823228233282342823528236282372823828239282402824128242282432824428245282462824728248282492825028251282522825328254282552825628257282582825928260282612826228263282642826528266282672826828269282702827128272282732827428275282762827728278282792828028281282822828328284282852828628287282882828928290282912829228293282942829528296282972829828299283002830128302283032830428305283062830728308283092831028311283122831328314283152831628317283182831928320283212832228323283242832528326283272832828329283302833128332283332833428335283362833728338283392834028341283422834328344283452834628347283482834928350283512835228353283542835528356283572835828359283602836128362283632836428365283662836728368283692837028371283722837328374283752837628377283782837928380283812838228383283842838528386283872838828389283902839128392283932839428395283962839728398283992840028401284022840328404284052840628407284082840928410284112841228413284142841528416284172841828419284202842128422284232842428425284262842728428284292843028431284322843328434284352843628437284382843928440284412844228443284442844528446284472844828449284502845128452284532845428455284562845728458284592846028461284622846328464284652846628467284682846928470284712847228473284742847528476284772847828479284802848128482284832848428485284862848728488284892849028491284922849328494284952849628497284982849928500285012850228503285042850528506285072850828509285102851128512285132851428515285162851728518285192852028521285222852328524285252852628527285282852928530285312853228533285342853528536285372853828539285402854128542285432854428545285462854728548285492855028551285522855328554285552855628557285582855928560285612856228563285642856528566285672856828569285702857128572285732857428575285762857728578285792858028581285822858328584285852858628587285882858928590285912859228593285942859528596285972859828599286002860128602286032860428605286062860728608286092861028611286122861328614286152861628617286182861928620286212862228623286242862528626286272862828629286302863128632286332863428635286362863728638286392864028641286422864328644286452864628647286482864928650286512865228653286542865528656286572865828659286602866128662286632866428665286662866728668286692867028671286722867328674286752867628677286782867928680286812868228683286842868528686286872868828689286902869128692286932869428695286962869728698286992870028701287022870328704287052870628707287082870928710287112871228713287142871528716287172871828719287202872128722287232872428725287262872728728287292873028731287322873328734287352873628737287382873928740287412874228743287442874528746287472874828749287502875128752287532875428755287562875728758287592876028761287622876328764287652876628767287682876928770287712877228773287742877528776287772877828779287802878128782287832878428785287862878728788287892879028791287922879328794287952879628797287982879928800288012880228803288042880528806288072880828809288102881128812288132881428815288162881728818288192882028821288222882328824288252882628827288282882928830288312883228833288342883528836288372883828839288402884128842288432884428845288462884728848288492885028851288522885328854288552885628857288582885928860288612886228863288642886528866288672886828869288702887128872288732887428875288762887728878288792888028881288822888328884288852888628887288882888928890288912889228893288942889528896288972889828899289002890128902289032890428905289062890728908289092891028911289122891328914289152891628917289182891928920289212892228923289242892528926289272892828929289302893128932289332893428935289362893728938289392894028941289422894328944289452894628947289482894928950289512895228953289542895528956289572895828959289602896128962289632896428965289662896728968289692897028971289722897328974289752897628977289782897928980289812898228983289842898528986289872898828989289902899128992289932899428995289962899728998289992900029001290022900329004290052900629007290082900929010290112901229013290142901529016290172901829019290202902129022290232902429025290262902729028290292903029031290322903329034290352903629037290382903929040290412904229043290442904529046290472904829049290502905129052290532905429055290562905729058290592906029061290622906329064290652906629067290682906929070290712907229073290742907529076290772907829079290802908129082290832908429085290862908729088290892909029091290922909329094290952909629097290982909929100291012910229103291042910529106291072910829109291102911129112291132911429115291162911729118291192912029121291222912329124291252912629127291282912929130291312913229133291342913529136291372913829139291402914129142291432914429145291462914729148291492915029151291522915329154291552915629157291582915929160291612916229163291642916529166291672916829169291702917129172291732917429175291762917729178291792918029181291822918329184291852918629187291882918929190291912919229193291942919529196291972919829199292002920129202292032920429205292062920729208292092921029211292122921329214292152921629217292182921929220292212922229223292242922529226292272922829229292302923129232292332923429235292362923729238292392924029241292422924329244292452924629247292482924929250292512925229253292542925529256292572925829259292602926129262292632926429265292662926729268292692927029271292722927329274292752927629277292782927929280292812928229283292842928529286292872928829289292902929129292292932929429295292962929729298292992930029301293022930329304293052930629307293082930929310293112931229313293142931529316293172931829319293202932129322293232932429325293262932729328293292933029331293322933329334293352933629337293382933929340293412934229343293442934529346293472934829349293502935129352293532935429355293562935729358293592936029361293622936329364293652936629367293682936929370293712937229373293742937529376293772937829379293802938129382293832938429385293862938729388293892939029391293922939329394293952939629397293982939929400294012940229403294042940529406294072940829409294102941129412294132941429415294162941729418294192942029421294222942329424294252942629427294282942929430294312943229433294342943529436294372943829439294402944129442294432944429445294462944729448294492945029451294522945329454294552945629457294582945929460294612946229463294642946529466294672946829469294702947129472294732947429475294762947729478294792948029481294822948329484294852948629487294882948929490294912949229493294942949529496294972949829499295002950129502295032950429505295062950729508295092951029511295122951329514295152951629517295182951929520295212952229523295242952529526295272952829529295302953129532295332953429535295362953729538295392954029541295422954329544295452954629547295482954929550295512955229553295542955529556295572955829559295602956129562295632956429565295662956729568295692957029571295722957329574295752957629577295782957929580295812958229583295842958529586295872958829589295902959129592295932959429595295962959729598295992960029601296022960329604296052960629607296082960929610296112961229613296142961529616296172961829619296202962129622296232962429625296262962729628296292963029631296322963329634296352963629637296382963929640296412964229643296442964529646296472964829649296502965129652296532965429655296562965729658296592966029661296622966329664296652966629667296682966929670296712967229673296742967529676296772967829679296802968129682296832968429685296862968729688296892969029691296922969329694296952969629697296982969929700297012970229703297042970529706297072970829709297102971129712297132971429715297162971729718297192972029721297222972329724297252972629727297282972929730297312973229733297342973529736297372973829739297402974129742297432974429745297462974729748297492975029751297522975329754297552975629757297582975929760297612976229763297642976529766297672976829769297702977129772297732977429775297762977729778297792978029781297822978329784297852978629787297882978929790297912979229793297942979529796297972979829799298002980129802298032980429805298062980729808298092981029811298122981329814298152981629817298182981929820298212982229823298242982529826298272982829829298302983129832298332983429835298362983729838298392984029841298422984329844298452984629847298482984929850298512985229853298542985529856298572985829859298602986129862298632986429865298662986729868298692987029871298722987329874298752987629877298782987929880298812988229883298842988529886298872988829889298902989129892298932989429895298962989729898298992990029901299022990329904299052990629907299082990929910299112991229913299142991529916299172991829919299202992129922299232992429925299262992729928299292993029931299322993329934299352993629937299382993929940299412994229943299442994529946299472994829949299502995129952299532995429955299562995729958299592996029961299622996329964299652996629967299682996929970299712997229973299742997529976299772997829979299802998129982299832998429985299862998729988299892999029991299922999329994299952999629997299982999930000300013000230003300043000530006300073000830009300103001130012300133001430015300163001730018300193002030021300223002330024300253002630027300283002930030300313003230033300343003530036300373003830039300403004130042300433004430045300463004730048300493005030051300523005330054300553005630057300583005930060300613006230063300643006530066300673006830069300703007130072300733007430075300763007730078300793008030081300823008330084300853008630087300883008930090300913009230093300943009530096300973009830099301003010130102301033010430105301063010730108301093011030111301123011330114301153011630117301183011930120301213012230123301243012530126301273012830129301303013130132301333013430135301363013730138301393014030141301423014330144301453014630147301483014930150301513015230153301543015530156301573015830159301603016130162301633016430165301663016730168301693017030171301723017330174301753017630177301783017930180301813018230183301843018530186301873018830189301903019130192301933019430195301963019730198301993020030201302023020330204302053020630207302083020930210302113021230213302143021530216302173021830219302203022130222302233022430225302263022730228302293023030231302323023330234302353023630237302383023930240302413024230243302443024530246302473024830249302503025130252302533025430255302563025730258302593026030261302623026330264302653026630267302683026930270302713027230273302743027530276302773027830279302803028130282302833028430285302863028730288302893029030291302923029330294302953029630297302983029930300303013030230303303043030530306303073030830309303103031130312303133031430315303163031730318303193032030321303223032330324303253032630327303283032930330303313033230333303343033530336303373033830339303403034130342303433034430345303463034730348303493035030351303523035330354303553035630357303583035930360303613036230363303643036530366303673036830369303703037130372303733037430375303763037730378303793038030381303823038330384303853038630387303883038930390303913039230393303943039530396303973039830399304003040130402304033040430405304063040730408304093041030411304123041330414304153041630417304183041930420304213042230423304243042530426304273042830429304303043130432304333043430435304363043730438304393044030441304423044330444304453044630447304483044930450304513045230453304543045530456304573045830459304603046130462304633046430465304663046730468304693047030471304723047330474304753047630477304783047930480304813048230483304843048530486304873048830489304903049130492304933049430495304963049730498304993050030501305023050330504305053050630507305083050930510305113051230513305143051530516305173051830519305203052130522305233052430525305263052730528305293053030531305323053330534305353053630537305383053930540305413054230543305443054530546305473054830549305503055130552305533055430555305563055730558305593056030561305623056330564305653056630567305683056930570305713057230573305743057530576305773057830579305803058130582305833058430585305863058730588305893059030591305923059330594305953059630597305983059930600306013060230603306043060530606306073060830609306103061130612306133061430615306163061730618306193062030621306223062330624306253062630627306283062930630306313063230633306343063530636306373063830639306403064130642306433064430645306463064730648306493065030651306523065330654306553065630657306583065930660306613066230663306643066530666306673066830669306703067130672306733067430675306763067730678306793068030681306823068330684306853068630687306883068930690306913069230693306943069530696306973069830699307003070130702307033070430705307063070730708307093071030711307123071330714307153071630717307183071930720307213072230723307243072530726307273072830729307303073130732307333073430735307363073730738307393074030741307423074330744307453074630747307483074930750307513075230753307543075530756307573075830759307603076130762307633076430765307663076730768307693077030771307723077330774307753077630777307783077930780307813078230783307843078530786307873078830789307903079130792307933079430795307963079730798307993080030801308023080330804308053080630807308083080930810308113081230813308143081530816308173081830819308203082130822308233082430825308263082730828308293083030831308323083330834308353083630837308383083930840308413084230843308443084530846308473084830849308503085130852308533085430855308563085730858308593086030861308623086330864308653086630867308683086930870308713087230873308743087530876308773087830879308803088130882308833088430885308863088730888308893089030891308923089330894308953089630897308983089930900309013090230903309043090530906309073090830909309103091130912309133091430915309163091730918309193092030921309223092330924309253092630927309283092930930309313093230933309343093530936309373093830939309403094130942309433094430945309463094730948309493095030951309523095330954309553095630957309583095930960309613096230963309643096530966309673096830969309703097130972309733097430975309763097730978309793098030981309823098330984309853098630987309883098930990309913099230993309943099530996309973099830999310003100131002310033100431005310063100731008310093101031011310123101331014310153101631017310183101931020310213102231023310243102531026310273102831029310303103131032310333103431035310363103731038310393104031041310423104331044310453104631047310483104931050310513105231053310543105531056310573105831059310603106131062310633106431065310663106731068310693107031071310723107331074310753107631077310783107931080310813108231083310843108531086310873108831089310903109131092310933109431095310963109731098310993110031101311023110331104311053110631107311083110931110311113111231113311143111531116311173111831119311203112131122311233112431125311263112731128311293113031131311323113331134311353113631137311383113931140311413114231143311443114531146311473114831149311503115131152311533115431155311563115731158311593116031161311623116331164311653116631167311683116931170311713117231173311743117531176311773117831179311803118131182311833118431185311863118731188311893119031191311923119331194311953119631197311983119931200312013120231203312043120531206312073120831209312103121131212312133121431215312163121731218312193122031221312223122331224312253122631227312283122931230312313123231233312343123531236312373123831239312403124131242312433124431245312463124731248312493125031251312523125331254312553125631257312583125931260312613126231263312643126531266312673126831269312703127131272312733127431275312763127731278312793128031281312823128331284312853128631287312883128931290312913129231293312943129531296312973129831299313003130131302313033130431305313063130731308313093131031311313123131331314313153131631317313183131931320313213132231323313243132531326313273132831329313303133131332313333133431335313363133731338313393134031341313423134331344313453134631347313483134931350313513135231353313543135531356313573135831359313603136131362313633136431365313663136731368313693137031371313723137331374313753137631377313783137931380313813138231383313843138531386313873138831389313903139131392313933139431395313963139731398313993140031401314023140331404314053140631407314083140931410314113141231413314143141531416314173141831419314203142131422314233142431425314263142731428314293143031431314323143331434314353143631437314383143931440314413144231443314443144531446314473144831449314503145131452314533145431455314563145731458314593146031461314623146331464314653146631467314683146931470314713147231473314743147531476314773147831479314803148131482314833148431485314863148731488314893149031491314923149331494314953149631497314983149931500315013150231503315043150531506315073150831509315103151131512315133151431515315163151731518315193152031521315223152331524315253152631527315283152931530315313153231533315343153531536315373153831539315403154131542315433154431545315463154731548315493155031551315523155331554315553155631557315583155931560315613156231563315643156531566315673156831569315703157131572315733157431575315763157731578315793158031581315823158331584315853158631587315883158931590315913159231593315943159531596315973159831599316003160131602316033160431605316063160731608316093161031611316123161331614316153161631617316183161931620316213162231623316243162531626316273162831629316303163131632316333163431635316363163731638316393164031641316423164331644316453164631647316483164931650316513165231653316543165531656316573165831659316603166131662316633166431665316663166731668316693167031671316723167331674316753167631677316783167931680316813168231683316843168531686316873168831689316903169131692316933169431695316963169731698316993170031701317023170331704317053170631707317083170931710317113171231713317143171531716317173171831719317203172131722317233172431725317263172731728317293173031731317323173331734317353173631737317383173931740317413174231743317443174531746317473174831749317503175131752317533175431755317563175731758317593176031761317623176331764317653176631767317683176931770317713177231773317743177531776317773177831779317803178131782317833178431785317863178731788317893179031791317923179331794317953179631797317983179931800318013180231803318043180531806318073180831809318103181131812318133181431815318163181731818318193182031821318223182331824318253182631827318283182931830318313183231833318343183531836318373183831839318403184131842318433184431845318463184731848318493185031851318523185331854318553185631857318583185931860318613186231863318643186531866318673186831869318703187131872318733187431875318763187731878318793188031881318823188331884318853188631887318883188931890318913189231893318943189531896318973189831899319003190131902319033190431905319063190731908319093191031911319123191331914319153191631917319183191931920319213192231923319243192531926319273192831929319303193131932319333193431935319363193731938319393194031941319423194331944319453194631947319483194931950319513195231953319543195531956319573195831959319603196131962319633196431965319663196731968319693197031971319723197331974319753197631977319783197931980319813198231983319843198531986319873198831989319903199131992319933199431995319963199731998319993200032001320023200332004320053200632007320083200932010320113201232013320143201532016320173201832019320203202132022320233202432025320263202732028320293203032031320323203332034320353203632037320383203932040320413204232043320443204532046320473204832049320503205132052320533205432055320563205732058320593206032061320623206332064320653206632067320683206932070320713207232073320743207532076320773207832079320803208132082320833208432085320863208732088320893209032091320923209332094320953209632097320983209932100321013210232103321043210532106321073210832109321103211132112321133211432115321163211732118321193212032121321223212332124321253212632127321283212932130321313213232133321343213532136321373213832139321403214132142321433214432145321463214732148321493215032151321523215332154321553215632157321583215932160321613216232163321643216532166321673216832169321703217132172321733217432175321763217732178321793218032181321823218332184321853218632187321883218932190321913219232193321943219532196321973219832199322003220132202322033220432205322063220732208322093221032211322123221332214322153221632217322183221932220322213222232223322243222532226322273222832229322303223132232322333223432235322363223732238322393224032241322423224332244322453224632247322483224932250322513225232253322543225532256322573225832259322603226132262322633226432265322663226732268322693227032271322723227332274322753227632277322783227932280322813228232283322843228532286322873228832289322903229132292322933229432295322963229732298322993230032301323023230332304323053230632307323083230932310323113231232313323143231532316323173231832319323203232132322323233232432325323263232732328323293233032331323323233332334323353233632337323383233932340323413234232343323443234532346323473234832349323503235132352323533235432355323563235732358323593236032361323623236332364323653236632367323683236932370323713237232373323743237532376323773237832379323803238132382323833238432385323863238732388323893239032391323923239332394323953239632397323983239932400324013240232403324043240532406324073240832409324103241132412324133241432415324163241732418324193242032421324223242332424324253242632427324283242932430324313243232433324343243532436324373243832439324403244132442324433244432445324463244732448324493245032451324523245332454324553245632457324583245932460324613246232463324643246532466324673246832469324703247132472324733247432475324763247732478324793248032481324823248332484324853248632487324883248932490324913249232493324943249532496324973249832499325003250132502325033250432505325063250732508325093251032511325123251332514325153251632517325183251932520325213252232523325243252532526325273252832529325303253132532325333253432535325363253732538325393254032541325423254332544325453254632547325483254932550325513255232553325543255532556325573255832559325603256132562325633256432565325663256732568325693257032571325723257332574325753257632577325783257932580325813258232583325843258532586325873258832589325903259132592325933259432595325963259732598325993260032601326023260332604326053260632607326083260932610326113261232613326143261532616326173261832619326203262132622326233262432625326263262732628326293263032631326323263332634326353263632637326383263932640326413264232643326443264532646326473264832649326503265132652326533265432655326563265732658326593266032661326623266332664326653266632667326683266932670326713267232673326743267532676326773267832679326803268132682326833268432685326863268732688326893269032691326923269332694326953269632697326983269932700327013270232703327043270532706327073270832709327103271132712327133271432715327163271732718327193272032721327223272332724327253272632727327283272932730327313273232733327343273532736327373273832739327403274132742327433274432745327463274732748327493275032751327523275332754327553275632757327583275932760327613276232763327643276532766327673276832769327703277132772327733277432775327763277732778327793278032781327823278332784327853278632787327883278932790327913279232793327943279532796327973279832799328003280132802328033280432805328063280732808328093281032811328123281332814328153281632817328183281932820328213282232823328243282532826328273282832829328303283132832328333283432835328363283732838328393284032841328423284332844328453284632847328483284932850328513285232853328543285532856328573285832859328603286132862328633286432865328663286732868328693287032871328723287332874328753287632877328783287932880328813288232883328843288532886328873288832889328903289132892328933289432895328963289732898328993290032901329023290332904329053290632907329083290932910329113291232913329143291532916329173291832919329203292132922329233292432925329263292732928329293293032931329323293332934329353293632937329383293932940329413294232943329443294532946329473294832949329503295132952329533295432955329563295732958329593296032961329623296332964329653296632967329683296932970329713297232973329743297532976329773297832979329803298132982329833298432985329863298732988329893299032991329923299332994329953299632997329983299933000330013300233003330043300533006330073300833009330103301133012330133301433015330163301733018330193302033021330223302333024330253302633027330283302933030330313303233033330343303533036330373303833039330403304133042330433304433045330463304733048330493305033051330523305333054330553305633057330583305933060330613306233063330643306533066330673306833069330703307133072330733307433075330763307733078330793308033081330823308333084330853308633087330883308933090330913309233093330943309533096330973309833099331003310133102331033310433105331063310733108331093311033111331123311333114331153311633117331183311933120331213312233123331243312533126331273312833129331303313133132331333313433135331363313733138331393314033141331423314333144331453314633147331483314933150331513315233153331543315533156331573315833159331603316133162331633316433165331663316733168331693317033171331723317333174331753317633177331783317933180331813318233183331843318533186331873318833189331903319133192331933319433195331963319733198331993320033201332023320333204332053320633207332083320933210332113321233213332143321533216332173321833219332203322133222332233322433225332263322733228332293323033231332323323333234332353323633237332383323933240332413324233243332443324533246332473324833249332503325133252332533325433255332563325733258332593326033261332623326333264332653326633267332683326933270332713327233273332743327533276332773327833279332803328133282332833328433285332863328733288332893329033291332923329333294332953329633297332983329933300333013330233303333043330533306333073330833309333103331133312333133331433315333163331733318333193332033321333223332333324333253332633327333283332933330333313333233333333343333533336333373333833339333403334133342333433334433345333463334733348333493335033351333523335333354333553335633357333583335933360333613336233363333643336533366333673336833369333703337133372333733337433375333763337733378333793338033381333823338333384333853338633387333883338933390333913339233393333943339533396333973339833399334003340133402334033340433405334063340733408334093341033411334123341333414334153341633417334183341933420334213342233423334243342533426334273342833429334303343133432334333343433435334363343733438334393344033441334423344333444334453344633447334483344933450334513345233453334543345533456334573345833459334603346133462334633346433465334663346733468334693347033471334723347333474334753347633477334783347933480334813348233483334843348533486334873348833489334903349133492334933349433495334963349733498334993350033501335023350333504335053350633507335083350933510335113351233513335143351533516335173351833519335203352133522335233352433525335263352733528335293353033531335323353333534335353353633537335383353933540335413354233543335443354533546335473354833549335503355133552335533355433555335563355733558335593356033561335623356333564335653356633567335683356933570335713357233573335743357533576335773357833579335803358133582335833358433585335863358733588335893359033591335923359333594335953359633597335983359933600336013360233603336043360533606336073360833609336103361133612336133361433615336163361733618336193362033621336223362333624336253362633627336283362933630336313363233633336343363533636336373363833639336403364133642336433364433645336463364733648336493365033651336523365333654336553365633657336583365933660336613366233663336643366533666336673366833669336703367133672336733367433675336763367733678336793368033681336823368333684336853368633687336883368933690336913369233693336943369533696336973369833699337003370133702337033370433705337063370733708337093371033711337123371333714337153371633717337183371933720337213372233723337243372533726337273372833729337303373133732337333373433735337363373733738337393374033741337423374333744337453374633747337483374933750337513375233753337543375533756337573375833759337603376133762337633376433765337663376733768337693377033771337723377333774337753377633777337783377933780337813378233783337843378533786337873378833789337903379133792337933379433795337963379733798337993380033801338023380333804338053380633807338083380933810338113381233813338143381533816338173381833819338203382133822338233382433825338263382733828338293383033831338323383333834338353383633837338383383933840338413384233843338443384533846338473384833849338503385133852338533385433855338563385733858338593386033861338623386333864338653386633867338683386933870338713387233873338743387533876338773387833879338803388133882338833388433885338863388733888338893389033891338923389333894338953389633897338983389933900339013390233903339043390533906339073390833909339103391133912339133391433915339163391733918339193392033921339223392333924339253392633927339283392933930339313393233933339343393533936339373393833939339403394133942339433394433945339463394733948339493395033951339523395333954339553395633957339583395933960339613396233963339643396533966339673396833969339703397133972339733397433975339763397733978339793398033981339823398333984339853398633987339883398933990339913399233993339943399533996339973399833999340003400134002340033400434005340063400734008340093401034011340123401334014340153401634017340183401934020340213402234023340243402534026340273402834029340303403134032340333403434035340363403734038340393404034041340423404334044340453404634047340483404934050340513405234053340543405534056340573405834059340603406134062340633406434065340663406734068340693407034071340723407334074340753407634077340783407934080340813408234083340843408534086340873408834089340903409134092340933409434095340963409734098340993410034101341023410334104341053410634107341083410934110341113411234113341143411534116341173411834119341203412134122341233412434125341263412734128341293413034131341323413334134341353413634137341383413934140341413414234143341443414534146341473414834149341503415134152341533415434155341563415734158341593416034161341623416334164341653416634167341683416934170341713417234173341743417534176341773417834179341803418134182341833418434185341863418734188341893419034191341923419334194341953419634197341983419934200342013420234203342043420534206342073420834209342103421134212342133421434215342163421734218342193422034221342223422334224342253422634227342283422934230342313423234233342343423534236342373423834239342403424134242342433424434245342463424734248342493425034251342523425334254342553425634257342583425934260342613426234263342643426534266342673426834269342703427134272342733427434275342763427734278342793428034281342823428334284342853428634287342883428934290342913429234293342943429534296342973429834299343003430134302343033430434305343063430734308343093431034311343123431334314343153431634317343183431934320343213432234323343243432534326343273432834329343303433134332343333433434335343363433734338343393434034341343423434334344343453434634347343483434934350343513435234353343543435534356343573435834359343603436134362343633436434365343663436734368343693437034371343723437334374343753437634377343783437934380343813438234383343843438534386343873438834389343903439134392343933439434395343963439734398343993440034401344023440334404344053440634407344083440934410344113441234413344143441534416344173441834419344203442134422344233442434425344263442734428344293443034431344323443334434344353443634437344383443934440344413444234443344443444534446344473444834449344503445134452344533445434455344563445734458344593446034461344623446334464344653446634467344683446934470344713447234473344743447534476344773447834479344803448134482344833448434485344863448734488344893449034491344923449334494344953449634497344983449934500345013450234503345043450534506345073450834509345103451134512345133451434515345163451734518345193452034521345223452334524345253452634527345283452934530345313453234533345343453534536345373453834539345403454134542345433454434545345463454734548345493455034551345523455334554345553455634557345583455934560345613456234563345643456534566345673456834569345703457134572345733457434575345763457734578345793458034581345823458334584345853458634587345883458934590345913459234593345943459534596345973459834599346003460134602346033460434605346063460734608346093461034611346123461334614346153461634617346183461934620346213462234623346243462534626346273462834629346303463134632346333463434635346363463734638346393464034641346423464334644346453464634647346483464934650346513465234653346543465534656346573465834659346603466134662346633466434665346663466734668346693467034671346723467334674346753467634677346783467934680346813468234683346843468534686346873468834689346903469134692346933469434695346963469734698346993470034701347023470334704347053470634707347083470934710347113471234713347143471534716347173471834719347203472134722347233472434725347263472734728347293473034731347323473334734347353473634737347383473934740347413474234743347443474534746347473474834749347503475134752347533475434755347563475734758347593476034761347623476334764347653476634767347683476934770347713477234773347743477534776347773477834779347803478134782347833478434785347863478734788347893479034791347923479334794347953479634797347983479934800348013480234803348043480534806348073480834809348103481134812348133481434815348163481734818348193482034821348223482334824348253482634827348283482934830348313483234833348343483534836348373483834839348403484134842348433484434845348463484734848348493485034851348523485334854348553485634857348583485934860348613486234863348643486534866348673486834869348703487134872348733487434875348763487734878348793488034881348823488334884348853488634887348883488934890348913489234893348943489534896348973489834899349003490134902349033490434905349063490734908349093491034911349123491334914349153491634917349183491934920349213492234923349243492534926349273492834929349303493134932349333493434935349363493734938349393494034941349423494334944349453494634947349483494934950349513495234953349543495534956349573495834959349603496134962349633496434965349663496734968349693497034971349723497334974349753497634977349783497934980349813498234983349843498534986349873498834989349903499134992349933499434995349963499734998349993500035001350023500335004350053500635007350083500935010350113501235013350143501535016350173501835019350203502135022350233502435025350263502735028350293503035031350323503335034350353503635037350383503935040350413504235043350443504535046350473504835049350503505135052350533505435055350563505735058350593506035061350623506335064350653506635067350683506935070350713507235073350743507535076350773507835079350803508135082350833508435085350863508735088350893509035091350923509335094350953509635097350983509935100351013510235103351043510535106351073510835109351103511135112351133511435115351163511735118351193512035121351223512335124351253512635127351283512935130351313513235133351343513535136351373513835139351403514135142351433514435145351463514735148351493515035151351523515335154351553515635157351583515935160351613516235163351643516535166351673516835169351703517135172351733517435175351763517735178351793518035181351823518335184351853518635187351883518935190351913519235193351943519535196351973519835199352003520135202352033520435205352063520735208352093521035211352123521335214352153521635217352183521935220352213522235223352243522535226352273522835229352303523135232352333523435235352363523735238352393524035241352423524335244352453524635247352483524935250352513525235253352543525535256352573525835259352603526135262352633526435265352663526735268352693527035271352723527335274352753527635277352783527935280352813528235283352843528535286352873528835289352903529135292352933529435295352963529735298352993530035301353023530335304353053530635307353083530935310353113531235313353143531535316353173531835319353203532135322353233532435325353263532735328353293533035331353323533335334353353533635337353383533935340353413534235343353443534535346353473534835349353503535135352353533535435355353563535735358353593536035361353623536335364353653536635367353683536935370353713537235373353743537535376353773537835379353803538135382353833538435385353863538735388353893539035391353923539335394353953539635397353983539935400354013540235403354043540535406354073540835409354103541135412354133541435415354163541735418354193542035421354223542335424354253542635427354283542935430354313543235433354343543535436354373543835439354403544135442354433544435445354463544735448354493545035451354523545335454354553545635457354583545935460354613546235463354643546535466354673546835469354703547135472354733547435475354763547735478354793548035481354823548335484354853548635487354883548935490354913549235493354943549535496354973549835499355003550135502355033550435505355063550735508355093551035511355123551335514355153551635517355183551935520355213552235523355243552535526355273552835529355303553135532355333553435535355363553735538355393554035541355423554335544355453554635547355483554935550355513555235553355543555535556355573555835559355603556135562355633556435565355663556735568355693557035571355723557335574355753557635577355783557935580355813558235583355843558535586355873558835589355903559135592
  1. <?xml version="1.0"?>
  2. <doc>
  3. <assembly>
  4. <name>com.Tivadar.Best.HTTP</name>
  5. </assembly>
  6. <members>
  7. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves">
  8. <summary>Elliptic curve registry for ANSSI.</summary>
  9. </member>
  10. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves.GetByName(System.String)">
  11. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given name.</summary>
  12. <param name="name">The name of the curve.</param>
  13. </member>
  14. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves.GetByNameLazy(System.String)">
  15. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given name.</summary>
  16. <remarks>
  17. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  18. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  19. </remarks>
  20. <param name="name">The name of the curve.</param>
  21. </member>
  22. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves.GetByOid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  23. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given
  24. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  25. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  26. </member>
  27. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves.GetByOidLazy(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  28. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given
  29. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  30. <remarks>
  31. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  32. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  33. </remarks>
  34. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  35. </member>
  36. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves.GetName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  37. <summary>Look up the name of the curve with the given <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  38. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  39. </member>
  40. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves.GetOid(System.String)">
  41. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> of the curve with the given name.</summary>
  42. <param name="name">The name of the curve.</param>
  43. </member>
  44. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves.Names">
  45. <summary>Enumerate the available curve names in this registry.</summary>
  46. </member>
  47. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1BitStringParser.GetBitStream">
  48. <summary>Return a <see cref="T:System.IO.Stream"/> representing the contents of the BIT STRING. The final byte, if any,
  49. may include pad bits. See <see cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1BitStringParser.PadBits"/>.</summary>
  50. <returns>A <see cref="T:System.IO.Stream"/> with its source as the BIT STRING content.</returns>
  51. <exception cref="T:System.IO.IOException"/>
  52. </member>
  53. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1BitStringParser.GetOctetStream">
  54. <summary>Return a <see cref="T:System.IO.Stream"/> representing the contents of the BIT STRING, where the content is
  55. expected to be octet-aligned (this will be automatically checked during parsing).</summary>
  56. <returns>A <see cref="T:System.IO.Stream"/> with its source as the BIT STRING content.</returns>
  57. <exception cref="T:System.IO.IOException"/>
  58. </member>
  59. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1BitStringParser.PadBits">
  60. <summary>Return the number of pad bits, if any, in the final byte, if any, read from
  61. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1BitStringParser.GetBitStream"/>.</summary>
  62. <remarks>
  63. This number is in the range zero to seven. That number of the least significant bits of the final byte, if
  64. any, are not part of the contents and should be ignored. NOTE: Must be called AFTER the stream has been
  65. fully processed. (Does not need to be called if <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1BitStringParser.GetOctetStream"/> was used instead of
  66. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1BitStringParser.GetBitStream"/>.
  67. </remarks>
  68. <returns>The number of pad bits. In the range zero to seven.</returns>
  69. </member>
  70. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable.GetDerEncoded">
  71. Return the DER encoding of the object, null if the DER encoding can not be made.
  72. @return a DER byte array, null otherwise.
  73. </member>
  74. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1EncodableVector">
  75. Mutable class for building ASN.1 constructed objects such as SETs or SEQUENCEs.
  76. </member>
  77. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1GeneralizedTime">
  78. <summary>GeneralizedTime ASN.1 type</summary>
  79. </member>
  80. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1InputStream">
  81. a general purpose ASN.1 decoder - note: this class differs from the
  82. others in that it returns null after it has read the last object in
  83. the stream. If an ASN.1 Null is encountered a Der/BER Null object is
  84. returned.
  85. </member>
  86. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1InputStream.#ctor(System.Byte[])">
  87. Create an ASN1InputStream based on the input byte array. The length of DER objects in
  88. the stream is automatically limited to the length of the input array.
  89. @param input array containing ASN.1 encoded data.
  90. </member>
  91. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1InputStream.#ctor(System.IO.Stream,System.Int32)">
  92. Create an ASN1InputStream where no DER object will be longer than limit.
  93. @param input stream containing ASN.1 encoded data.
  94. @param limit maximum size of a DER encoded object.
  95. </member>
  96. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1InputStream.BuildObject(System.Int32,System.Int32,System.Int32)">
  97. build an object given its tag and the number of bytes to construct it from.
  98. </member>
  99. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Null">
  100. A Null object.
  101. </member>
  102. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Object.FromByteArray(System.Byte[])">
  103. <summary>Create a base ASN.1 object from a byte array.</summary>
  104. <param name="data">The byte array to parse.</param>
  105. <returns>The base ASN.1 object represented by the byte array.</returns>
  106. <exception cref="T:System.IO.IOException">
  107. If there is a problem parsing the data, or parsing an object did not exhaust the available data.
  108. </exception>
  109. </member>
  110. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Object.FromStream(System.IO.Stream)">
  111. <summary>Read a base ASN.1 object from a stream.</summary>
  112. <param name="inStr">The stream to parse.</param>
  113. <returns>The base ASN.1 object represented by the byte array.</returns>
  114. <exception cref="T:System.IO.IOException">If there is a problem parsing the data.</exception>
  115. </member>
  116. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1ObjectDescriptor.GetInstance(System.Object)">
  117. Return an ObjectDescriptor from the passed in object.
  118. @param obj an ASN1ObjectDescriptor or an object that can be converted into one.
  119. @exception IllegalArgumentException if the object cannot be converted.
  120. @return an ASN1ObjectDescriptor instance, or null.
  121. </member>
  122. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1ObjectDescriptor.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  123. Return an ObjectDescriptor from a tagged object.
  124. @param taggedObject the tagged object holding the object we want.
  125. @param declaredExplicit true if the object is meant to be explicitly tagged, false otherwise.
  126. @exception IllegalArgumentException if the tagged object cannot be converted.
  127. @return an ASN1ObjectDescriptor instance, or null.
  128. </member>
  129. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1OctetString.GetInstance(System.Object)">
  130. return an Octet string from the given object.
  131. @param obj the object we want converted.
  132. @exception ArgumentException if the object cannot be converted.
  133. </member>
  134. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1OctetString.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  135. return an octet string from a tagged object.
  136. @param taggedObject the tagged object holding the object we want.
  137. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  138. @exception ArgumentException if the tagged object cannot be converted.
  139. </member>
  140. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1OctetString.#ctor(System.Byte[])">
  141. @param string the octets making up the octet string.
  142. </member>
  143. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1OctetStringParser.GetOctetStream">
  144. <summary>Return the content of the OCTET STRING as a <see cref="T:System.IO.Stream"/>.</summary>
  145. <returns>A <see cref="T:System.IO.Stream"/> represnting the OCTET STRING's content.</returns>
  146. </member>
  147. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence.GetInstance(System.Object)">
  148. return an Asn1Sequence from the given object.
  149. @param obj the object we want converted.
  150. @exception ArgumentException if the object cannot be converted.
  151. </member>
  152. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  153. Return an ASN1 sequence from a tagged object. There is a special
  154. case here, if an object appears to have been explicitly tagged on
  155. reading but we were expecting it to be implicitly tagged in the
  156. normal course of events it indicates that we lost the surrounding
  157. sequence - so we need to add it back (this will happen if the tagged
  158. object is a sequence that contains other sequences). If you are
  159. dealing with implicitly tagged sequences you really <b>should</b>
  160. be using this method.
  161. @param taggedObject the tagged object.
  162. @param declaredExplicit true if the object is meant to be explicitly tagged, false otherwise.
  163. @exception ArgumentException if the tagged object cannot be converted.
  164. </member>
  165. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence.Item(System.Int32)">
  166. return the object at the sequence position indicated by index.
  167. @param index the sequence number (starting at zero) of the object
  168. @return the object at the sequence position indicated by index.
  169. </member>
  170. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Set.GetInstance(System.Object)">
  171. return an ASN1Set from the given object.
  172. @param obj the object we want converted.
  173. @exception ArgumentException if the object cannot be converted.
  174. </member>
  175. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Set.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  176. Return an ASN1 set from a tagged object. There is a special
  177. case here, if an object appears to have been explicitly tagged on
  178. reading but we were expecting it to be implicitly tagged in the
  179. normal course of events it indicates that we lost the surrounding
  180. set - so we need to add it back (this will happen if the tagged
  181. object is a sequence that contains other sequences). If you are
  182. dealing with implicitly tagged sets you really <b>should</b>
  183. be using this method.
  184. @param taggedObject the tagged object.
  185. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  186. @exception ArgumentException if the tagged object cannot be converted.
  187. </member>
  188. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Set.Item(System.Int32)">
  189. return the object at the set position indicated by index.
  190. @param index the set number (starting at zero) of the object
  191. @return the object at the set position indicated by index.
  192. </member>
  193. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject">
  194. ASN.1 TaggedObject - in ASN.1 notation this is any object preceded by
  195. a [n] where n is some number - these are assumed to follow the construction
  196. rules (as with sequences).
  197. </member>
  198. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject.#ctor(System.Boolean,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  199. @param explicitly true if the object is explicitly tagged.
  200. @param tagNo the tag number for this object.
  201. @param obj the tagged object.
  202. </member>
  203. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject.IsExplicit">
  204. return whether or not the object may be explicitly tagged.
  205. <p>
  206. Note: if the object has been read from an input stream, the only
  207. time you can be sure if isExplicit is returning the true state of
  208. affairs is if it returns false. An implicitly tagged object may appear
  209. to be explicitly tagged, so you need to understand the context under
  210. which the reading was done as well, see GetObject below.</p>
  211. </member>
  212. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject.GetObject">
  213. return whatever was following the tag.
  214. <p>
  215. Note: tagged objects are generally context dependent if you're
  216. trying to extract a tagged object you should be going via the
  217. appropriate GetInstance method.</p>
  218. </member>
  219. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject.GetBaseObject">
  220. Needed for open types, until we have better type-guided parsing support. Use sparingly for other
  221. purposes, and prefer {@link #getExplicitBaseTagged()}, {@link #getImplicitBaseTagged(int, int)} or
  222. {@link #getBaseUniversal(boolean, int)} where possible. Before using, check for matching tag
  223. {@link #getTagClass() class} and {@link #getTagNo() number}.
  224. </member>
  225. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject.GetExplicitBaseObject">
  226. Needed for open types, until we have better type-guided parsing support. Use
  227. sparingly for other purposes, and prefer {@link #getExplicitBaseTagged()} or
  228. {@link #getBaseUniversal(boolean, int)} where possible. Before using, check
  229. for matching tag {@link #getTagClass() class} and {@link #getTagNo() number}.
  230. </member>
  231. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser.ParseBaseUniversal(System.Boolean,System.Int32)">
  232. <exception cref="T:System.IO.IOException"/>
  233. </member>
  234. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser.ParseExplicitBaseObject">
  235. <summary>Needed for open types, until we have better type-guided parsing support.</summary>
  236. <remarks>
  237. Use sparingly for other purposes, and prefer <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser.ParseExplicitBaseTagged"/> or
  238. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser.ParseBaseUniversal(System.Boolean,System.Int32)"/> where possible. Before using, check for matching tag
  239. <see cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser.TagClass">class</see> and <see cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser.TagNo">number</see>.
  240. </remarks>
  241. <exception cref="T:System.IO.IOException"/>
  242. </member>
  243. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser.ParseExplicitBaseTagged">
  244. <exception cref="T:System.IO.IOException"/>
  245. </member>
  246. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser.ParseImplicitBaseTagged(System.Int32,System.Int32)">
  247. <exception cref="T:System.IO.IOException"/>
  248. </member>
  249. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1UniversalType.FromByteArray(System.Byte[])">
  250. <exception cref="T:System.IO.IOException"/>
  251. </member>
  252. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1UtcTime">
  253. <summary>UTCTime ASN.1 type</summary>
  254. </member>
  255. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1UtcTime.GetInstance(System.Object)">
  256. return a UTC Time from the passed in object.
  257. @exception ArgumentException if the object cannot be converted.
  258. </member>
  259. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1UtcTime.ToAdjustedDateTime">
  260. <summary>Return an adjusted date in the range of 1950 - 2049.</summary>
  261. </member>
  262. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.ParseExplicitBaseTagged(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Int32)">
  263. <exception cref="T:System.IO.IOException"/>
  264. </member>
  265. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.ParseExplicitContextBaseTagged(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32)">
  266. <exception cref="T:System.IO.IOException"/>
  267. </member>
  268. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.TryParseExplicitBaseTagged(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Int32)">
  269. <exception cref="T:System.IO.IOException"/>
  270. </member>
  271. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.TryParseExplicitContextBaseTagged(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32)">
  272. <exception cref="T:System.IO.IOException"/>
  273. </member>
  274. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.ParseImplicitBaseTagged(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Int32,System.Int32,System.Int32)">
  275. <exception cref="T:System.IO.IOException"/>
  276. </member>
  277. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.ParseImplicitContextBaseTagged(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Int32,System.Int32)">
  278. <exception cref="T:System.IO.IOException"/>
  279. </member>
  280. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.TryParseImplicitBaseTagged(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Int32,System.Int32,System.Int32)">
  281. <exception cref="T:System.IO.IOException"/>
  282. </member>
  283. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.TryParseImplicitContextBaseTagged(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Int32,System.Int32)">
  284. <exception cref="T:System.IO.IOException"/>
  285. </member>
  286. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.ParseBaseUniversal(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Int32,System.Boolean,System.Int32)">
  287. <exception cref="T:System.IO.IOException"/>
  288. </member>
  289. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.ParseContextBaseUniversal(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Boolean,System.Int32)">
  290. <exception cref="T:System.IO.IOException"/>
  291. </member>
  292. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.TryParseBaseUniversal(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Int32,System.Boolean,System.Int32)">
  293. <exception cref="T:System.IO.IOException"/>
  294. </member>
  295. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.TryParseContextBaseUniversal(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Boolean,System.Int32)">
  296. <exception cref="T:System.IO.IOException"/>
  297. </member>
  298. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.ParseExplicitBaseObject(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Int32)">
  299. <exception cref="T:System.IO.IOException"/>
  300. </member>
  301. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.ParseExplicitContextBaseObject(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32)">
  302. <exception cref="T:System.IO.IOException"/>
  303. </member>
  304. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.TryParseExplicitBaseObject(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32,System.Int32)">
  305. <exception cref="T:System.IO.IOException"/>
  306. </member>
  307. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Utilities.TryParseExplicitContextBaseObject(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObjectParser,System.Int32)">
  308. <exception cref="T:System.IO.IOException"/>
  309. </member>
  310. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc">
  311. iso.org.dod.internet.private.enterprise.legion-of-the-bouncy-castle
  312. <p>1.3.6.1.4.1.22554</p>
  313. </member>
  314. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe">
  315. pbe(1) algorithms
  316. <p>1.3.6.1.4.1.22554.1</p>
  317. </member>
  318. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1">
  319. SHA-1(1)
  320. <p>1.3.6.1.4.1.22554.1.1</p>
  321. </member>
  322. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256">
  323. SHA-2.SHA-256; 1.3.6.1.4.1.22554.1.2.1
  324. </member>
  325. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha384">
  326. SHA-2.SHA-384; 1.3.6.1.4.1.22554.1.2.2
  327. </member>
  328. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha512">
  329. SHA-2.SHA-512; 1.3.6.1.4.1.22554.1.2.3
  330. </member>
  331. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha224">
  332. SHA-2.SHA-224; 1.3.6.1.4.1.22554.1.2.4
  333. </member>
  334. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1_pkcs5">
  335. PKCS-5(1)|PKCS-12(2)
  336. SHA-1.PKCS5; 1.3.6.1.4.1.22554.1.1.1
  337. </member>
  338. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1_pkcs12">
  339. SHA-1.PKCS12; 1.3.6.1.4.1.22554.1.1.2
  340. </member>
  341. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256_pkcs5">
  342. SHA-256.PKCS12; 1.3.6.1.4.1.22554.1.2.1.1
  343. </member>
  344. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256_pkcs12">
  345. SHA-256.PKCS12; 1.3.6.1.4.1.22554.1.2.1.2
  346. </member>
  347. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes128_cbc">
  348. AES(1) . (CBC-128(2)|CBC-192(22)|CBC-256(42))
  349. 1.3.6.1.4.1.22554.1.1.2.1.2
  350. </member>
  351. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes192_cbc">
  352. 1.3.6.1.4.1.22554.1.1.2.1.22
  353. </member>
  354. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes256_cbc">
  355. 1.3.6.1.4.1.22554.1.1.2.1.42
  356. </member>
  357. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes128_cbc">
  358. 1.3.6.1.4.1.22554.1.1.2.2.2
  359. </member>
  360. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes192_cbc">
  361. 1.3.6.1.4.1.22554.1.1.2.2.22
  362. </member>
  363. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes256_cbc">
  364. 1.3.6.1.4.1.22554.1.1.2.2.42
  365. </member>
  366. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_sig">
  367. signature(2) algorithms
  368. </member>
  369. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.sphincs256">
  370. Sphincs-256
  371. </member>
  372. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.xmss">
  373. XMSS
  374. </member>
  375. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.xmss_mt">
  376. XMSS^MT
  377. </member>
  378. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.sphincsPlus">
  379. SPHINCS+
  380. </member>
  381. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.picnic">
  382. Picnic
  383. </member>
  384. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_exch">
  385. key_exchange(3) algorithms
  386. </member>
  387. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.newHope">
  388. NewHope
  389. </member>
  390. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_ext">
  391. X.509 extension(4) values
  392. <p/>
  393. 1.3.6.1.4.1.22554.4
  394. </member>
  395. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_kem">
  396. KEM(4) algorithms
  397. </member>
  398. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.pqc_kem_mceliece">
  399. Classic McEliece
  400. </member>
  401. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.pqc_kem_saber">
  402. SABER
  403. </member>
  404. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.pqc_kem_sike">
  405. SIKE
  406. </member>
  407. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.pqc_kem_kyber">
  408. Kyber
  409. </member>
  410. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.pqc_kem_bike">
  411. BIKE
  412. </member>
  413. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.pqc_kem_hqc">
  414. HQC
  415. </member>
  416. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC.LinkedCertificate">
  417. Extension to tie an alternate certificate to the containing certificate.
  418. <pre>
  419. LinkedCertificate := SEQUENCE {
  420. digest DigestInfo, -- digest of PQC certificate
  421. certLocation GeneralName, -- location of PQC certificate
  422. certIssuer [0] Name OPTIONAL, -- issuer of PQC cert (if different from current certificate)
  423. cACerts [1] GeneralNames OPTIONAL, -- CA certificates for PQC cert (one of more locations)
  424. }
  425. </pre>
  426. </member>
  427. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BerBitStringParser">
  428. <summary>A parser for indefinite-length BIT STRINGs.</summary>
  429. </member>
  430. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BerSequence.#ctor">
  431. create an empty sequence
  432. </member>
  433. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BerSequence.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  434. create a sequence containing one object
  435. </member>
  436. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BerSequence.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  437. create a sequence containing two objects
  438. </member>
  439. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BerSequence.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  440. create a sequence containing a vector of objects.
  441. </member>
  442. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BerSet.#ctor">
  443. create an empty set
  444. </member>
  445. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BerSet.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  446. create a set containing one object
  447. </member>
  448. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BerSet.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  449. create a set containing a vector of objects.
  450. </member>
  451. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BerTaggedObject">
  452. BER TaggedObject - in ASN.1 notation this is any object preceded by
  453. a [n] where n is some number - these are assumed to follow the construction
  454. rules (as with sequences).
  455. </member>
  456. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BerTaggedObject.#ctor(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  457. @param tagNo the tag number for this object.
  458. @param obj the tagged object.
  459. </member>
  460. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BerTaggedObject.#ctor(System.Boolean,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  461. @param isExplicit true if an explicitly tagged object.
  462. @param tagNo the tag number for this object.
  463. @param obj the tagged object.
  464. </member>
  465. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers">
  466. <remarks>See https://www.bsi.bund.de/cae/servlet/contentblob/471398/publicationFile/30615/BSI-TR-03111_pdf.pdf</remarks>
  467. </member>
  468. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.algorithm">
  469. 0.4.0.127.0.7.1
  470. </member>
  471. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf">
  472. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 OID: 0.4.0.127.0.7.1.1.5.1.1
  473. </member>
  474. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_SHA1">
  475. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  476. with hash function SHA-1
  477. OID: 0.4.0.127.0.7.1.1.5.1.1.1
  478. </member>
  479. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_SHA224">
  480. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  481. with hash function SHA224
  482. OID: 0.4.0.127.0.7.1.1.5.1.1.2
  483. </member>
  484. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_SHA256">
  485. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  486. with hash function SHA256
  487. OID: 0.4.0.127.0.7.1.1.5.1.1.3
  488. </member>
  489. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_SHA384">
  490. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  491. with hash function SHA384
  492. OID: 0.4.0.127.0.7.1.1.5.1.1.4
  493. </member>
  494. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_SHA512">
  495. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  496. with hash function SHA512
  497. OID: 0.4.0.127.0.7.1.1.5.1.1.5
  498. </member>
  499. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_RIPEMD160">
  500. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  501. with hash function RIPEMD160
  502. OID: 0.4.0.127.0.7.1.1.5.1.1.6
  503. </member>
  504. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_SessionKDF">
  505. Key Derivation Function for Session Keys
  506. </member>
  507. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CAKeyUpdAnnContent.ToAsn1Object">
  508. <pre>
  509. CAKeyUpdAnnContent ::= SEQUENCE {
  510. oldWithNew CmpCertificate, -- old pub signed with new priv
  511. newWithOld CmpCertificate, -- new pub signed with old priv
  512. newWithNew CmpCertificate -- new pub signed with new priv
  513. }
  514. </pre>
  515. @return a basic ASN.1 object representation.
  516. </member>
  517. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CertAnnContent">
  518. CertAnnContent ::= CMPCertificate
  519. </member>
  520. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CertConfirmContent.ToAsn1Object">
  521. <pre>
  522. CertConfirmContent ::= SEQUENCE OF CertStatus
  523. </pre>
  524. @return a basic ASN.1 object representation.
  525. </member>
  526. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CertifiedKeyPair.ToAsn1Object">
  527. <pre>
  528. CertifiedKeyPair ::= SEQUENCE {
  529. certOrEncCert CertOrEncCert,
  530. privateKey [0] EncryptedValue OPTIONAL,
  531. -- see [CRMF] for comment on encoding
  532. publicationInfo [1] PKIPublicationInfo OPTIONAL
  533. }
  534. </pre>
  535. @return a basic ASN.1 object representation.
  536. </member>
  537. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CertOrEncCert.ToAsn1Object">
  538. <pre>
  539. CertOrEncCert ::= CHOICE {
  540. certificate [0] CMPCertificate,
  541. encryptedCert [1] EncryptedKey
  542. }
  543. </pre>
  544. @return a basic ASN.1 object representation.
  545. </member>
  546. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CertRepMessage.ToAsn1Object">
  547. <pre>
  548. CertRepMessage ::= SEQUENCE {
  549. caPubs [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
  550. OPTIONAL,
  551. response SEQUENCE OF CertResponse
  552. }
  553. </pre>
  554. @return a basic ASN.1 object representation.
  555. </member>
  556. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CertReqTemplateContent">
  557. GenMsg: {id-it 19}, &lt; absent &gt;
  558. GenRep: {id-it 19}, CertReqTemplateContent | &lt; absent &gt;
  559. <p>
  560. CertReqTemplateValue ::= CertReqTemplateContent
  561. </p><p>
  562. CertReqTemplateContent ::= SEQUENCE {
  563. certTemplate CertTemplate,
  564. keySpec Controls OPTIONAL }
  565. </p><p>
  566. Controls ::= SEQUENCE SIZE (1..MAX) OF AttributeTypeAndValue
  567. </p>
  568. </member>
  569. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CertResponse.ToAsn1Object">
  570. <pre>
  571. CertResponse ::= SEQUENCE {
  572. certReqId INTEGER,
  573. -- to match this response with corresponding request (a value
  574. -- of -1 is to be used if certReqId is not specified in the
  575. -- corresponding request)
  576. status PKIStatusInfo,
  577. certifiedKeyPair CertifiedKeyPair OPTIONAL,
  578. rspInfo OCTET STRING OPTIONAL
  579. -- analogous to the id-regInfo-utf8Pairs string defined
  580. -- for regInfo in CertReqMsg [CRMF]
  581. }
  582. </pre>
  583. @return a basic ASN.1 object representation.
  584. </member>
  585. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CertStatus.ToAsn1Object">
  586. <pre>
  587. CertStatus ::= SEQUENCE {
  588. certHash OCTET STRING,
  589. certReqId INTEGER,
  590. statusInfo PKIStatusInfo OPTIONAL,
  591. hashAlg [0] AlgorithmIdentifier{DIGEST-ALGORITHM, {...}} OPTIONAL
  592. }
  593. </pre>
  594. @return a basic ASN.1 object representation.
  595. </member>
  596. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.Challenge">
  597. <pre>
  598. Challenge ::= SEQUENCE {
  599. owf AlgorithmIdentifier OPTIONAL,
  600. -- MUST be present in the first Challenge; MAY be omitted in
  601. -- any subsequent Challenge in POPODecKeyChallContent (if
  602. -- omitted, then the owf used in the immediately preceding
  603. -- Challenge is to be used).
  604. witness OCTET STRING,
  605. -- the result of applying the one-way function (owf) to a
  606. -- randomly-generated INTEGER, A. [Note that a different
  607. -- INTEGER MUST be used for each Challenge.]
  608. challenge OCTET STRING
  609. -- the encryption (under the public key for which the cert.
  610. -- request is being made) of Rand, where Rand is specified as
  611. -- Rand ::= SEQUENCE {
  612. -- int INTEGER,
  613. -- - the randomly-generated INTEGER A (above)
  614. -- sender GeneralName
  615. -- - the sender's name (as included in PKIHeader)
  616. -- }
  617. }
  618. </pre>
  619. </member>
  620. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.Challenge.ToAsn1Object">
  621. <pre>
  622. Challenge ::= SEQUENCE {
  623. owf AlgorithmIdentifier OPTIONAL,
  624. -- MUST be present in the first Challenge; MAY be omitted in
  625. -- any subsequent Challenge in POPODecKeyChallContent (if
  626. -- omitted, then the owf used in the immediately preceding
  627. -- Challenge is to be used).
  628. witness OCTET STRING,
  629. -- the result of applying the one-way function (owf) to a
  630. -- randomly-generated INTEGER, A. [Note that a different
  631. -- INTEGER MUST be used for each Challenge.]
  632. challenge OCTET STRING
  633. -- the encryption (under the public key for which the cert.
  634. -- request is being made) of Rand, where Rand is specified as
  635. -- Rand ::= SEQUENCE {
  636. -- int INTEGER,
  637. -- - the randomly-generated INTEGER A (above)
  638. -- sender GeneralName
  639. -- - the sender's name (as included in PKIHeader)
  640. -- }
  641. }
  642. </pre>
  643. @return a basic ASN.1 object representation.
  644. </member>
  645. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.Challenge.Rand">
  646. Rand is the inner type
  647. </member>
  648. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpCertificate.#ctor(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  649. Note: the addition of other certificates is a BC extension. If you use this constructor they
  650. will be added with an explicit tag value of type.
  651. @param type the type of the certificate (used as a tag value).
  652. @param otherCert the object representing the certificate
  653. </member>
  654. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpCertificate.ToAsn1Object">
  655. <pre>
  656. CMPCertificate ::= CHOICE {
  657. x509v3PKCert Certificate
  658. x509v2AttrCert [1] AttributeCertificate
  659. }
  660. </pre>
  661. Note: the addition of attribute certificates is a BC extension.
  662. @return a basic ASN.1 object representation.
  663. </member>
  664. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.passwordBasedMac">
  665. id-PasswordBasedMac OBJECT IDENTIFIER ::= {1 2 840 113533 7 66 13}
  666. </member>
  667. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.dhBasedMac">
  668. id-DHBasedMac OBJECT IDENTIFIER ::= {1 2 840 113533 7 66 30}
  669. </member>
  670. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_caProtEncCert">
  671. RFC 4120: it-id: PKIX.4 = 1.3.6.1.5.5.7.4
  672. RFC 4120: 1.3.6.1.5.5.7.4.1
  673. </member>
  674. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_signKeyPairTypes">
  675. RFC 4120: 1.3.6.1.5.5.7.4.2
  676. </member>
  677. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_encKeyPairTypes">
  678. RFC 4120: 1.3.6.1.5.5.7.4.3
  679. </member>
  680. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_preferredSymAlg">
  681. RFC 4120: 1.3.6.1.5.5.7.4.4
  682. </member>
  683. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_caKeyUpdateInfo">
  684. RFC 4120: 1.3.6.1.5.5.7.4.5
  685. </member>
  686. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_currentCRL">
  687. RFC 4120: 1.3.6.1.5.5.7.4.6
  688. </member>
  689. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_unsupportedOIDs">
  690. RFC 4120: 1.3.6.1.5.5.7.4.7
  691. </member>
  692. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_keyPairParamReq">
  693. RFC 4120: 1.3.6.1.5.5.7.4.10
  694. </member>
  695. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_keyPairParamRep">
  696. RFC 4120: 1.3.6.1.5.5.7.4.11
  697. </member>
  698. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_revPassphrase">
  699. RFC 4120: 1.3.6.1.5.5.7.4.12
  700. </member>
  701. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_implicitConfirm">
  702. RFC 4120: 1.3.6.1.5.5.7.4.13
  703. </member>
  704. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_confirmWaitTime">
  705. RFC 4120: 1.3.6.1.5.5.7.4.14
  706. </member>
  707. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_origPKIMessage">
  708. RFC 4120: 1.3.6.1.5.5.7.4.15
  709. </member>
  710. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.it_suppLangTags">
  711. RFC 4120: 1.3.6.1.5.5.7.4.16
  712. </member>
  713. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.id_it_caCerts">
  714. Update 16, RFC 4210
  715. {id-it 17}
  716. </member>
  717. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.id_it_rootCaKeyUpdate">
  718. Update 16, RFC 4210
  719. GenRep: {id-it 18}, RootCaKeyUpdateContent
  720. </member>
  721. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.id_it_certReqTemplate">
  722. Update 16, RFC 4210
  723. {id-it 19}
  724. </member>
  725. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.id_it_rootCaCert">
  726. Update 16, RFC 4210
  727. GenMsg: {id-it 20}, RootCaCertValue
  728. </member>
  729. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.id_it_certProfile">
  730. Update-16 to RFC 4210
  731. id-it-certProfile OBJECT IDENTIFIER ::= {id-it 21}
  732. </member>
  733. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.id_pkip">
  734. RFC 4211: it-pkip: PKIX.5 = 1.3.6.1.5.5.7.5
  735. </member>
  736. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.id_regCtrl">
  737. RFC 4211: it-regCtrl: 1.3.6.1.5.5.7.5.1
  738. </member>
  739. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.id_regInfo">
  740. RFC 4211: it-regInfo: 1.3.6.1.5.5.7.5.2
  741. </member>
  742. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.regCtrl_regToken">
  743. 1.3.6.1.5.5.7.5.1.1
  744. </member>
  745. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.regCtrl_authenticator">
  746. 1.3.6.1.5.5.7.5.1.2
  747. </member>
  748. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.regCtrl_pkiPublicationInfo">
  749. 1.3.6.1.5.5.7.5.1.3
  750. </member>
  751. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.regCtrl_pkiArchiveOptions">
  752. 1.3.6.1.5.5.7.5.1.4
  753. </member>
  754. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.regCtrl_oldCertID">
  755. 1.3.6.1.5.5.7.5.1.5
  756. </member>
  757. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.regCtrl_protocolEncrKey">
  758. 1.3.6.1.5.5.7.5.1.6
  759. </member>
  760. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.regCtrl_altCertTemplate">
  761. From RFC4210:
  762. id-regCtrl-altCertTemplate OBJECT IDENTIFIER ::= {id-regCtrl 7}; 1.3.6.1.5.5.7.1.7
  763. </member>
  764. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.regInfo_utf8Pairs">
  765. RFC 4211: it-regInfo-utf8Pairs: 1.3.6.1.5.5.7.5.2.1
  766. </member>
  767. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.regInfo_certReq">
  768. RFC 4211: it-regInfo-certReq: 1.3.6.1.5.5.7.5.2.1
  769. </member>
  770. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.ct_encKeyWithID">
  771. 1.2.840.113549.1.9.16.1.21
  772. <p>
  773. id-ct OBJECT IDENTIFIER ::= { id-smime 1 } -- content types
  774. </p><p>
  775. id-ct-encKeyWithID OBJECT IDENTIFIER ::= {id-ct 21}
  776. </p>
  777. </member>
  778. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.id_regCtrl_algId">
  779. id-regCtrl-algId OBJECT IDENTIFIER ::= { iso(1)
  780. identified-organization(3) dod(6) internet(1) security(5)
  781. mechanisms(5) pkix(7) pkip(5) regCtrl(1) 11 }
  782. </member>
  783. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpObjectIdentifiers.id_regCtrl_rsaKeyLen">
  784. id-regCtrl-rsaKeyLen OBJECT IDENTIFIER ::= { iso(1)
  785. identified-organization(3) dod(6) internet(1) security(5)
  786. mechanisms(5) pkix(7) pkip(5) regCtrl(1) 12 }
  787. </member>
  788. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CrlAnnContent.ToAsn1Object">
  789. <pre>
  790. CrlAnnContent ::= SEQUENCE OF CertificateList
  791. </pre>
  792. @return a basic ASN.1 object representation.
  793. </member>
  794. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CrlSource">
  795. GenMsg: {id-it TBD1}, SEQUENCE SIZE (1..MAX) OF CRLStatus
  796. GenRep: {id-it TBD2}, SEQUENCE SIZE (1..MAX) OF
  797. CertificateList | &lt; absent &gt;
  798. <p>
  799. CRLSource ::= CHOICE {
  800. dpn [0] DistributionPointName,
  801. issuer [1] GeneralNames }
  802. </p>
  803. </member>
  804. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CrlStatus">
  805. CRLStatus ::= SEQUENCE {
  806. source CRLSource,
  807. thisUpdate Time OPTIONAL }
  808. </member>
  809. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.DhbmParameter">
  810. DHBMParameter ::= SEQUENCE {
  811. owf AlgorithmIdentifier,
  812. -- AlgId for a One-Way Function (SHA-1 recommended)
  813. mac AlgorithmIdentifier
  814. -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],
  815. } -- or HMAC [RFC2104, RFC2202])
  816. </member>
  817. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.ErrorMsgContent">
  818. <pre>
  819. ErrorMsgContent ::= SEQUENCE {
  820. pKIStatusInfo PKIStatusInfo,
  821. errorCode INTEGER OPTIONAL,
  822. -- implementation-specific error codes
  823. errorDetails PKIFreeText OPTIONAL
  824. -- implementation-specific error details
  825. }
  826. </pre>
  827. </member>
  828. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.ErrorMsgContent.ToAsn1Object">
  829. <pre>
  830. ErrorMsgContent ::= SEQUENCE {
  831. pKIStatusInfo PKIStatusInfo,
  832. errorCode INTEGER OPTIONAL,
  833. -- implementation-specific error codes
  834. errorDetails PKIFreeText OPTIONAL
  835. -- implementation-specific error details
  836. }
  837. </pre>
  838. @return a basic ASN.1 object representation.
  839. </member>
  840. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.GenMsgContent">
  841. <pre>GenMsgContent ::= SEQUENCE OF InfoTypeAndValue</pre>
  842. </member>
  843. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.GenMsgContent.ToAsn1Object">
  844. <pre>
  845. GenMsgContent ::= SEQUENCE OF InfoTypeAndValue
  846. </pre>
  847. @return a basic ASN.1 object representation.
  848. </member>
  849. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.GenRepContent.ToAsn1Object">
  850. <pre>
  851. GenRepContent ::= SEQUENCE OF InfoTypeAndValue
  852. </pre>
  853. @return a basic ASN.1 object representation.
  854. </member>
  855. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.InfoTypeAndValue">
  856. Example InfoTypeAndValue contents include, but are not limited
  857. to, the following (un-comment in this ASN.1 module and use as
  858. appropriate for a given environment):
  859. <pre>
  860. id-it-caProtEncCert OBJECT IDENTIFIER ::= {id-it 1}
  861. CAProtEncCertValue ::= CMPCertificate
  862. id-it-signKeyPairTypes OBJECT IDENTIFIER ::= {id-it 2}
  863. SignKeyPairTypesValue ::= SEQUENCE OF AlgorithmIdentifier
  864. id-it-encKeyPairTypes OBJECT IDENTIFIER ::= {id-it 3}
  865. EncKeyPairTypesValue ::= SEQUENCE OF AlgorithmIdentifier
  866. id-it-preferredSymmAlg OBJECT IDENTIFIER ::= {id-it 4}
  867. PreferredSymmAlgValue ::= AlgorithmIdentifier
  868. id-it-caKeyUpdateInfo OBJECT IDENTIFIER ::= {id-it 5}
  869. CAKeyUpdateInfoValue ::= CAKeyUpdAnnContent
  870. id-it-currentCRL OBJECT IDENTIFIER ::= {id-it 6}
  871. CurrentCRLValue ::= CertificateList
  872. id-it-unsupportedOIDs OBJECT IDENTIFIER ::= {id-it 7}
  873. UnsupportedOIDsValue ::= SEQUENCE OF OBJECT IDENTIFIER
  874. id-it-keyPairParamReq OBJECT IDENTIFIER ::= {id-it 10}
  875. KeyPairParamReqValue ::= OBJECT IDENTIFIER
  876. id-it-keyPairParamRep OBJECT IDENTIFIER ::= {id-it 11}
  877. KeyPairParamRepValue ::= AlgorithmIdentifer
  878. id-it-revPassphrase OBJECT IDENTIFIER ::= {id-it 12}
  879. RevPassphraseValue ::= EncryptedValue
  880. id-it-implicitConfirm OBJECT IDENTIFIER ::= {id-it 13}
  881. ImplicitConfirmValue ::= NULL
  882. id-it-confirmWaitTime OBJECT IDENTIFIER ::= {id-it 14}
  883. ConfirmWaitTimeValue ::= GeneralizedTime
  884. id-it-origPKIMessage OBJECT IDENTIFIER ::= {id-it 15}
  885. OrigPKIMessageValue ::= PKIMessages
  886. id-it-suppLangTags OBJECT IDENTIFIER ::= {id-it 16}
  887. SuppLangTagsValue ::= SEQUENCE OF UTF8String
  888. where
  889. id-pkix OBJECT IDENTIFIER ::= {
  890. iso(1) identified-organization(3)
  891. dod(6) internet(1) security(5) mechanisms(5) pkix(7)}
  892. and
  893. id-it OBJECT IDENTIFIER ::= {id-pkix 4}
  894. </pre>
  895. </member>
  896. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.InfoTypeAndValue.ToAsn1Object">
  897. <pre>
  898. InfoTypeAndValue ::= SEQUENCE {
  899. infoType OBJECT IDENTIFIER,
  900. infoValue ANY DEFINED BY infoType OPTIONAL
  901. }
  902. </pre>
  903. @return a basic ASN.1 object representation.
  904. </member>
  905. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.KeyRecRepContent.ToAsn1Object">
  906. <pre>
  907. KeyRecRepContent ::= SEQUENCE {
  908. status PKIStatusInfo,
  909. newSigCert [0] CMPCertificate OPTIONAL,
  910. caCerts [1] SEQUENCE SIZE (1..MAX) OF
  911. CMPCertificate OPTIONAL,
  912. keyPairHist [2] SEQUENCE SIZE (1..MAX) OF
  913. CertifiedKeyPair OPTIONAL
  914. }
  915. </pre>
  916. @return a basic ASN.1 object representation.
  917. </member>
  918. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.NestedMessageContent">
  919. NestedMessageContent ::= PKIMessages
  920. </member>
  921. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.OobCert">
  922. OOBCert ::= CMPCertificate
  923. </member>
  924. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.OobCertHash">
  925. <pre>
  926. OOBCertHash ::= SEQUENCE {
  927. hashAlg [0] AlgorithmIdentifier OPTIONAL,
  928. certId [1] CertId OPTIONAL,
  929. hashVal BIT STRING
  930. -- hashVal is calculated over the DER encoding of the
  931. -- self-signed certificate with the identifier certID.
  932. }
  933. </pre>
  934. </member>
  935. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.OobCertHash.ToAsn1Object">
  936. <pre>
  937. OobCertHash ::= SEQUENCE {
  938. hashAlg [0] AlgorithmIdentifier OPTIONAL,
  939. certId [1] CertId OPTIONAL,
  940. hashVal BIT STRING
  941. -- hashVal is calculated over the Der encoding of the
  942. -- self-signed certificate with the identifier certID.
  943. }
  944. </pre>
  945. @return a basic ASN.1 object representation.
  946. </member>
  947. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PbmParameter">
  948. PBMParameter ::= SEQUENCE {
  949. salt OCTET STRING,
  950. -- note: implementations MAY wish to limit acceptable sizes
  951. -- of this string to values appropriate for their environment
  952. -- in order to reduce the risk of denial-of-service attacks
  953. owf AlgorithmIdentifier,
  954. -- AlgId for a One-Way Function (SHA-1 recommended)
  955. iterationCount INTEGER,
  956. -- number of times the OWF is applied
  957. -- note: implementations MAY wish to limit acceptable sizes
  958. -- of this integer to values appropriate for their environment
  959. -- in order to reduce the risk of denial-of-service attacks
  960. mac AlgorithmIdentifier
  961. -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],
  962. } -- or HMAC [RFC2104, RFC2202])
  963. </member>
  964. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PbmParameter.ToAsn1Object">
  965. <pre>
  966. PbmParameter ::= SEQUENCE {
  967. salt OCTET STRING,
  968. -- note: implementations MAY wish to limit acceptable sizes
  969. -- of this string to values appropriate for their environment
  970. -- in order to reduce the risk of denial-of-service attacks
  971. owf AlgorithmIdentifier,
  972. -- AlgId for a One-Way Function (SHA-1 recommended)
  973. iterationCount INTEGER,
  974. -- number of times the OWF is applied
  975. -- note: implementations MAY wish to limit acceptable sizes
  976. -- of this integer to values appropriate for their environment
  977. -- in order to reduce the risk of denial-of-service attacks
  978. mac AlgorithmIdentifier
  979. -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],
  980. } -- or HMAC [RFC2104, RFC2202])
  981. </pre>
  982. @return a basic ASN.1 object representation.
  983. </member>
  984. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiBody">
  985. PKIBody ::= CHOICE { -- message-specific body elements
  986. ir [0] CertReqMessages, --Initialization Request
  987. ip [1] CertRepMessage, --Initialization Response
  988. cr [2] CertReqMessages, --Certification Request
  989. cp [3] CertRepMessage, --Certification Response
  990. p10cr [4] CertificationRequest, --imported from [PKCS10]
  991. popdecc [5] POPODecKeyChallContent, --pop Challenge
  992. popdecr [6] POPODecKeyRespContent, --pop Response
  993. kur [7] CertReqMessages, --Key Update Request
  994. kup [8] CertRepMessage, --Key Update Response
  995. krr [9] CertReqMessages, --Key Recovery Request
  996. krp [10] KeyRecRepContent, --Key Recovery Response
  997. rr [11] RevReqContent, --Revocation Request
  998. rp [12] RevRepContent, --Revocation Response
  999. ccr [13] CertReqMessages, --Cross-Cert. Request
  1000. ccp [14] CertRepMessage, --Cross-Cert. Response
  1001. ckuann [15] CAKeyUpdAnnContent, --CA Key Update Ann.
  1002. cann [16] CertAnnContent, --Certificate Ann.
  1003. rann [17] RevAnnContent, --Revocation Ann.
  1004. crlann [18] CRLAnnContent, --CRL Announcement
  1005. pkiconf [19] PKIConfirmContent, --Confirmation
  1006. nested [20] NestedMessageContent, --Nested Message
  1007. genm [21] GenMsgContent, --General Message
  1008. genp [22] GenRepContent, --General Response
  1009. error [23] ErrorMsgContent, --Error Message
  1010. certConf [24] CertConfirmContent, --Certificate confirm
  1011. pollReq [25] PollReqContent, --Polling request
  1012. pollRep [26] PollRepContent --Polling response
  1013. }
  1014. </member>
  1015. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiBody.#ctor(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  1016. Creates a new PkiBody.
  1017. @param type one of the TYPE_* constants
  1018. @param content message content
  1019. </member>
  1020. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiBody.ToAsn1Object">
  1021. <pre>
  1022. PkiBody ::= CHOICE { -- message-specific body elements
  1023. ir [0] CertReqMessages, --Initialization Request
  1024. ip [1] CertRepMessage, --Initialization Response
  1025. cr [2] CertReqMessages, --Certification Request
  1026. cp [3] CertRepMessage, --Certification Response
  1027. p10cr [4] CertificationRequest, --imported from [PKCS10]
  1028. popdecc [5] POPODecKeyChallContent, --pop Challenge
  1029. popdecr [6] POPODecKeyRespContent, --pop Response
  1030. kur [7] CertReqMessages, --Key Update Request
  1031. kup [8] CertRepMessage, --Key Update Response
  1032. krr [9] CertReqMessages, --Key Recovery Request
  1033. krp [10] KeyRecRepContent, --Key Recovery Response
  1034. rr [11] RevReqContent, --Revocation Request
  1035. rp [12] RevRepContent, --Revocation Response
  1036. ccr [13] CertReqMessages, --Cross-Cert. Request
  1037. ccp [14] CertRepMessage, --Cross-Cert. Response
  1038. ckuann [15] CAKeyUpdAnnContent, --CA Key Update Ann.
  1039. cann [16] CertAnnContent, --Certificate Ann.
  1040. rann [17] RevAnnContent, --Revocation Ann.
  1041. crlann [18] CRLAnnContent, --CRL Announcement
  1042. pkiconf [19] PKIConfirmContent, --Confirmation
  1043. nested [20] NestedMessageContent, --Nested Message
  1044. genm [21] GenMsgContent, --General Message
  1045. genp [22] GenRepContent, --General Response
  1046. error [23] ErrorMsgContent, --Error Message
  1047. certConf [24] CertConfirmContent, --Certificate confirm
  1048. pollReq [25] PollReqContent, --Polling request
  1049. pollRep [26] PollRepContent --Polling response
  1050. }
  1051. </pre>
  1052. @return a basic ASN.1 object representation.
  1053. </member>
  1054. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiConfirmContent">
  1055. PKIConfirmContent ::= NULL
  1056. </member>
  1057. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiConfirmContent.ToAsn1Object">
  1058. <pre>
  1059. PkiConfirmContent ::= NULL
  1060. </pre>
  1061. @return a basic ASN.1 object representation.
  1062. </member>
  1063. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiFailureInfo">
  1064. <pre>
  1065. PKIFailureInfo ::= BIT STRING {
  1066. badAlg (0),
  1067. -- unrecognized or unsupported Algorithm Identifier
  1068. badMessageCheck (1), -- integrity check failed (e.g., signature did not verify)
  1069. badRequest (2),
  1070. -- transaction not permitted or supported
  1071. badTime (3), -- messageTime was not sufficiently close to the system time, as defined by local policy
  1072. badCertId (4), -- no certificate could be found matching the provided criteria
  1073. badDataFormat (5),
  1074. -- the data submitted has the wrong format
  1075. wrongAuthority (6), -- the authority indicated in the request is different from the one creating the response token
  1076. incorrectData (7), -- the requester's data is incorrect (for notary services)
  1077. missingTimeStamp (8), -- when the timestamp is missing but should be there (by policy)
  1078. badPOP (9) -- the proof-of-possession failed
  1079. certRevoked (10),
  1080. certConfirmed (11),
  1081. wrongIntegrity (12),
  1082. badRecipientNonce (13),
  1083. timeNotAvailable (14),
  1084. -- the TSA's time source is not available
  1085. unacceptedPolicy (15),
  1086. -- the requested TSA policy is not supported by the TSA
  1087. unacceptedExtension (16),
  1088. -- the requested extension is not supported by the TSA
  1089. addInfoNotAvailable (17)
  1090. -- the additional information requested could not be understood
  1091. -- or is not available
  1092. badSenderNonce (18),
  1093. badCertTemplate (19),
  1094. signerNotTrusted (20),
  1095. transactionIdInUse (21),
  1096. unsupportedVersion (22),
  1097. notAuthorized (23),
  1098. systemUnavail (24),
  1099. systemFailure (25),
  1100. -- the request cannot be handled due to system failure
  1101. duplicateCertReq (26)
  1102. </pre>
  1103. </member>
  1104. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiFailureInfo.#ctor(System.Int32)">
  1105. Basic constructor.
  1106. </member>
  1107. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiFreeText.Item(System.Int32)">
  1108. Return the UTF8STRING at index.
  1109. @param index index of the string of interest
  1110. @return the string at index.
  1111. </member>
  1112. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiFreeText.ToAsn1Object">
  1113. <pre>
  1114. PkiFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String
  1115. </pre>
  1116. </member>
  1117. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiHeader.NULL_NAME">
  1118. Value for a "null" recipient or sender.
  1119. </member>
  1120. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiHeader.ToAsn1Object">
  1121. <pre>
  1122. PkiHeader ::= SEQUENCE {
  1123. pvno INTEGER { cmp1999(1), cmp2000(2) },
  1124. sender GeneralName,
  1125. -- identifies the sender
  1126. recipient GeneralName,
  1127. -- identifies the intended recipient
  1128. messageTime [0] GeneralizedTime OPTIONAL,
  1129. -- time of production of this message (used when sender
  1130. -- believes that the transport will be "suitable"; i.e.,
  1131. -- that the time will still be meaningful upon receipt)
  1132. protectionAlg [1] AlgorithmIdentifier OPTIONAL,
  1133. -- algorithm used for calculation of protection bits
  1134. senderKID [2] KeyIdentifier OPTIONAL,
  1135. recipKID [3] KeyIdentifier OPTIONAL,
  1136. -- to identify specific keys used for protection
  1137. transactionID [4] OCTET STRING OPTIONAL,
  1138. -- identifies the transaction; i.e., this will be the same in
  1139. -- corresponding request, response, certConf, and PKIConf
  1140. -- messages
  1141. senderNonce [5] OCTET STRING OPTIONAL,
  1142. recipNonce [6] OCTET STRING OPTIONAL,
  1143. -- nonces used to provide replay protection, senderNonce
  1144. -- is inserted by the creator of this message; recipNonce
  1145. -- is a nonce previously inserted in a related message by
  1146. -- the intended recipient of this message
  1147. freeText [7] PKIFreeText OPTIONAL,
  1148. -- this may be used to indicate context-specific instructions
  1149. -- (this field is intended for human consumption)
  1150. generalInfo [8] SEQUENCE SIZE (1..MAX) OF
  1151. InfoTypeAndValue OPTIONAL
  1152. -- this may be used to convey context-specific information
  1153. -- (this field not primarily intended for human consumption)
  1154. }
  1155. </pre>
  1156. @return a basic ASN.1 object representation.
  1157. </member>
  1158. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiHeaderBuilder.Build">
  1159. <pre>
  1160. PKIHeader ::= SEQUENCE {
  1161. pvno INTEGER { cmp1999(1), cmp2000(2) },
  1162. sender GeneralName,
  1163. -- identifies the sender
  1164. recipient GeneralName,
  1165. -- identifies the intended recipient
  1166. messageTime [0] GeneralizedTime OPTIONAL,
  1167. -- time of production of this message (used when sender
  1168. -- believes that the transport will be "suitable"; i.e.,
  1169. -- that the time will still be meaningful upon receipt)
  1170. protectionAlg [1] AlgorithmIdentifier OPTIONAL,
  1171. -- algorithm used for calculation of protection bits
  1172. senderKID [2] KeyIdentifier OPTIONAL,
  1173. recipKID [3] KeyIdentifier OPTIONAL,
  1174. -- to identify specific keys used for protection
  1175. transactionID [4] OCTET STRING OPTIONAL,
  1176. -- identifies the transaction; i.e., this will be the same in
  1177. -- corresponding request, response, certConf, and PKIConf
  1178. -- messages
  1179. senderNonce [5] OCTET STRING OPTIONAL,
  1180. recipNonce [6] OCTET STRING OPTIONAL,
  1181. -- nonces used to provide replay protection, senderNonce
  1182. -- is inserted by the creator of this message; recipNonce
  1183. -- is a nonce previously inserted in a related message by
  1184. -- the intended recipient of this message
  1185. freeText [7] PKIFreeText OPTIONAL,
  1186. -- this may be used to indicate context-specific instructions
  1187. -- (this field is intended for human consumption)
  1188. generalInfo [8] SEQUENCE SIZE (1..MAX) OF
  1189. InfoTypeAndValue OPTIONAL
  1190. -- this may be used to convey context-specific information
  1191. -- (this field not primarily intended for human consumption)
  1192. }
  1193. </pre>
  1194. @return a basic ASN.1 object representation.
  1195. </member>
  1196. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiMessage.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiHeader,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiBody,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBitString,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.CmpCertificate[])">
  1197. Creates a new PkiMessage.
  1198. @param header message header
  1199. @param body message body
  1200. @param protection message protection (may be null)
  1201. @param extraCerts extra certificates (may be null)
  1202. </member>
  1203. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiMessage.ToAsn1Object">
  1204. <pre>
  1205. PkiMessage ::= SEQUENCE {
  1206. header PKIHeader,
  1207. body PKIBody,
  1208. protection [0] PKIProtection OPTIONAL,
  1209. extraCerts [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
  1210. OPTIONAL
  1211. }
  1212. </pre>
  1213. @return a basic ASN.1 object representation.
  1214. </member>
  1215. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiMessages.ToAsn1Object">
  1216. <pre>
  1217. PkiMessages ::= SEQUENCE SIZE (1..MAX) OF PkiMessage
  1218. </pre>
  1219. @return a basic ASN.1 object representation.
  1220. </member>
  1221. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiStatusInfo.#ctor(System.Int32)">
  1222. @param status
  1223. </member>
  1224. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiStatusInfo.#ctor(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiFreeText)">
  1225. @param status
  1226. @param statusString
  1227. </member>
  1228. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiStatusInfo.ToAsn1Object">
  1229. <pre>
  1230. PkiStatusInfo ::= SEQUENCE {
  1231. status PKIStatus, (INTEGER)
  1232. statusString PkiFreeText OPTIONAL,
  1233. failInfo PkiFailureInfo OPTIONAL (BIT STRING)
  1234. }
  1235. PKIStatus:
  1236. granted (0), -- you got exactly what you asked for
  1237. grantedWithMods (1), -- you got something like what you asked for
  1238. rejection (2), -- you don't get it, more information elsewhere in the message
  1239. waiting (3), -- the request body part has not yet been processed, expect to hear more later
  1240. revocationWarning (4), -- this message contains a warning that a revocation is imminent
  1241. revocationNotification (5), -- notification that a revocation has occurred
  1242. keyUpdateWarning (6) -- update already done for the oldCertId specified in CertReqMsg
  1243. PkiFailureInfo:
  1244. badAlg (0), -- unrecognized or unsupported Algorithm Identifier
  1245. badMessageCheck (1), -- integrity check failed (e.g., signature did not verify)
  1246. badRequest (2), -- transaction not permitted or supported
  1247. badTime (3), -- messageTime was not sufficiently close to the system time, as defined by local policy
  1248. badCertId (4), -- no certificate could be found matching the provided criteria
  1249. badDataFormat (5), -- the data submitted has the wrong format
  1250. wrongAuthority (6), -- the authority indicated in the request is different from the one creating the response token
  1251. incorrectData (7), -- the requester's data is incorrect (for notary services)
  1252. missingTimeStamp (8), -- when the timestamp is missing but should be there (by policy)
  1253. badPOP (9) -- the proof-of-possession failed
  1254. </pre>
  1255. </member>
  1256. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PollRepContent">
  1257. PollRepContent ::= SEQUENCE OF SEQUENCE {
  1258. certReqId INTEGER,
  1259. checkAfter INTEGER, -- time in seconds
  1260. reason PKIFreeText OPTIONAL }
  1261. </member>
  1262. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PollRepContent.ToAsn1Object">
  1263. <pre>
  1264. PollRepContent ::= SEQUENCE OF SEQUENCE {
  1265. certReqId INTEGER,
  1266. checkAfter INTEGER, -- time in seconds
  1267. reason PKIFreeText OPTIONAL
  1268. }
  1269. </pre>
  1270. @return a basic ASN.1 object representation.
  1271. </member>
  1272. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PollReqContent.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerInteger)">
  1273. Create a pollReqContent for a single certReqId.
  1274. @param certReqId the certificate request ID.
  1275. </member>
  1276. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PollReqContent.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerInteger[])">
  1277. Create a pollReqContent for a multiple certReqIds.
  1278. @param certReqIds the certificate request IDs.
  1279. </member>
  1280. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PollReqContent.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  1281. Create a pollReqContent for a single certReqId.
  1282. @param certReqId the certificate request ID.
  1283. </member>
  1284. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PollReqContent.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger[])">
  1285. Create a pollReqContent for a multiple certReqIds.
  1286. @param certReqIds the certificate request IDs.
  1287. </member>
  1288. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PollReqContent.ToAsn1Object">
  1289. <pre>
  1290. PollReqContent ::= SEQUENCE OF SEQUENCE {
  1291. certReqId INTEGER
  1292. }
  1293. </pre>
  1294. @return a basic ASN.1 object representation.
  1295. </member>
  1296. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PopoDecKeyChallContent.ToAsn1Object">
  1297. <pre>
  1298. PopoDecKeyChallContent ::= SEQUENCE OF Challenge
  1299. </pre>
  1300. @return a basic ASN.1 object representation.
  1301. </member>
  1302. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PopoDecKeyRespContent.ToAsn1Object">
  1303. <pre>
  1304. PopoDecKeyRespContent ::= SEQUENCE OF INTEGER
  1305. </pre>
  1306. @return a basic ASN.1 object representation.
  1307. </member>
  1308. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.ProtectedPart.ToAsn1Object">
  1309. <pre>
  1310. ProtectedPart ::= SEQUENCE {
  1311. header PKIHeader,
  1312. body PKIBody
  1313. }
  1314. </pre>
  1315. @return a basic ASN.1 object representation.
  1316. </member>
  1317. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.RevAnnContent.ToAsn1Object">
  1318. <pre>
  1319. RevAnnContent ::= SEQUENCE {
  1320. status PKIStatus,
  1321. certId CertId,
  1322. willBeRevokedAt GeneralizedTime,
  1323. badSinceDate GeneralizedTime,
  1324. crlDetails Extensions OPTIONAL
  1325. -- extra CRL details (e.g., crl number, reason, location, etc.)
  1326. }
  1327. </pre>
  1328. @return a basic ASN.1 object representation.
  1329. </member>
  1330. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.RevDetails">
  1331. <pre>
  1332. RevDetails ::= SEQUENCE {
  1333. certDetails CertTemplate,
  1334. -- allows requester to specify as much as they can about
  1335. -- the cert. for which revocation is requested
  1336. -- (e.g., for cases in which serialNumber is not available)
  1337. crlEntryDetails Extensions OPTIONAL
  1338. -- requested crlEntryExtensions
  1339. }
  1340. </pre>
  1341. </member>
  1342. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.RevDetails.ToAsn1Object">
  1343. <pre>
  1344. RevDetails ::= SEQUENCE {
  1345. certDetails CertTemplate,
  1346. -- allows requester to specify as much as they can about
  1347. -- the cert. for which revocation is requested
  1348. -- (e.g., for cases in which serialNumber is not available)
  1349. crlEntryDetails Extensions OPTIONAL
  1350. -- requested crlEntryExtensions
  1351. }
  1352. </pre>
  1353. @return a basic ASN.1 object representation.
  1354. </member>
  1355. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.RevRepContent">
  1356. <pre>
  1357. RevRepContent ::= SEQUENCE {
  1358. status SEQUENCE SIZE (1..MAX) OF PKIStatusInfo,
  1359. -- in same order as was sent in RevReqContent
  1360. revCerts [0] SEQUENCE SIZE (1..MAX) OF CertId
  1361. OPTIONAL,
  1362. -- IDs for which revocation was requested
  1363. -- (same order as status)
  1364. crls [1] SEQUENCE SIZE (1..MAX) OF CertificateList OPTIONAL
  1365. -- the resulting CRLs (there may be more than one)
  1366. }
  1367. </pre>
  1368. </member>
  1369. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.RevRepContent.ToAsn1Object">
  1370. <pre>
  1371. RevRepContent ::= SEQUENCE {
  1372. status SEQUENCE SIZE (1..MAX) OF PKIStatusInfo,
  1373. -- in same order as was sent in RevReqContent
  1374. revCerts [0] SEQUENCE SIZE (1..MAX) OF CertId OPTIONAL,
  1375. -- IDs for which revocation was requested
  1376. -- (same order as status)
  1377. crls [1] SEQUENCE SIZE (1..MAX) OF CertificateList OPTIONAL
  1378. -- the resulting CRLs (there may be more than one)
  1379. }
  1380. </pre>
  1381. @return a basic ASN.1 object representation.
  1382. </member>
  1383. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.RevReqContent.ToAsn1Object">
  1384. <pre>
  1385. RevReqContent ::= SEQUENCE OF RevDetails
  1386. </pre>
  1387. @return a basic ASN.1 object representation.
  1388. </member>
  1389. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.RootCaKeyUpdateContent">
  1390. GenMsg: {id-it 20}, RootCaCertValue | &lt; absent &gt;
  1391. GenRep: {id-it 18}, RootCaKeyUpdateContent | &lt; absent &gt;
  1392. <p>
  1393. RootCaCertValue ::= CMPCertificate
  1394. </p><p>
  1395. RootCaKeyUpdateValue ::= RootCaKeyUpdateContent
  1396. </p><p>
  1397. RootCaKeyUpdateContent ::= SEQUENCE {
  1398. newWithNew CMPCertificate,
  1399. newWithOld [0] CMPCertificate OPTIONAL,
  1400. oldWithNew [1] CMPCertificate OPTIONAL
  1401. }
  1402. </p>
  1403. </member>
  1404. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.Attribute.GetInstance(System.Object)">
  1405. return an Attribute object from the given object.
  1406. @param o the object we want converted.
  1407. @exception ArgumentException if the object cannot be converted.
  1408. </member>
  1409. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.Attribute.ToAsn1Object">
  1410. Produce an object suitable for an Asn1OutputStream.
  1411. <pre>
  1412. Attribute ::= SEQUENCE {
  1413. attrType OBJECT IDENTIFIER,
  1414. attrValues SET OF AttributeValue
  1415. }
  1416. </pre>
  1417. </member>
  1418. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.Attributes.ToAsn1Object">
  1419. <pre>
  1420. Attributes ::=
  1421. SET SIZE(1..MAX) OF Attribute -- according to RFC 5652
  1422. </pre>
  1423. @return
  1424. </member>
  1425. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable.Item(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  1426. <summary>Return the first attribute matching the given OBJECT IDENTIFIER</summary>
  1427. </member>
  1428. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable.GetAll(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  1429. Return all the attributes matching the OBJECT IDENTIFIER oid. The vector will be
  1430. empty if there are no attributes of the required type present.
  1431. @param oid type of attribute required.
  1432. @return a vector of all the attributes found of type oid.
  1433. </member>
  1434. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable.Add(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  1435. Return a new table with the passed in attribute added.
  1436. @param attrType
  1437. @param attrValue
  1438. @return
  1439. </member>
  1440. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AuthenticatedData.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1441. return an AuthenticatedData object from a tagged object.
  1442. @param obj the tagged object holding the object we want.
  1443. @param isExplicit true if the object is meant to be explicitly
  1444. tagged false otherwise.
  1445. @throws ArgumentException if the object held by the
  1446. tagged object cannot be converted.
  1447. </member>
  1448. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AuthenticatedData.GetInstance(System.Object)">
  1449. return an AuthenticatedData object from the given object.
  1450. @param obj the object we want converted.
  1451. @throws ArgumentException if the object cannot be converted.
  1452. </member>
  1453. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AuthenticatedData.ToAsn1Object">
  1454. Produce an object suitable for an Asn1OutputStream.
  1455. <pre>
  1456. AuthenticatedData ::= SEQUENCE {
  1457. version CMSVersion,
  1458. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  1459. recipientInfos RecipientInfos,
  1460. macAlgorithm MessageAuthenticationCodeAlgorithm,
  1461. digestAlgorithm [1] DigestAlgorithmIdentifier OPTIONAL,
  1462. encapContentInfo EncapsulatedContentInfo,
  1463. authAttrs [2] IMPLICIT AuthAttributes OPTIONAL,
  1464. mac MessageAuthenticationCode,
  1465. unauthAttrs [3] IMPLICIT UnauthAttributes OPTIONAL }
  1466. AuthAttributes ::= SET SIZE (1..MAX) OF Attribute
  1467. UnauthAttributes ::= SET SIZE (1..MAX) OF Attribute
  1468. MessageAuthenticationCode ::= OCTET STRING
  1469. </pre>
  1470. </member>
  1471. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AuthenticatedDataParser">
  1472. Produce an object suitable for an Asn1OutputStream.
  1473. <pre>
  1474. AuthenticatedData ::= SEQUENCE {
  1475. version CMSVersion,
  1476. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  1477. recipientInfos RecipientInfos,
  1478. macAlgorithm MessageAuthenticationCodeAlgorithm,
  1479. digestAlgorithm [1] DigestAlgorithmIdentifier OPTIONAL,
  1480. encapContentInfo EncapsulatedContentInfo,
  1481. authAttrs [2] IMPLICIT AuthAttributes OPTIONAL,
  1482. mac MessageAuthenticationCode,
  1483. unauthAttrs [3] IMPLICIT UnauthAttributes OPTIONAL }
  1484. AuthAttributes ::= SET SIZE (1..MAX) OF Attribute
  1485. UnauthAttributes ::= SET SIZE (1..MAX) OF Attribute
  1486. MessageAuthenticationCode ::= OCTET STRING
  1487. </pre>
  1488. </member>
  1489. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AuthEnvelopedData.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1490. return an AuthEnvelopedData object from a tagged object.
  1491. @param obj the tagged object holding the object we want.
  1492. @param isExplicit true if the object is meant to be explicitly
  1493. tagged false otherwise.
  1494. @throws ArgumentException if the object held by the
  1495. tagged object cannot be converted.
  1496. </member>
  1497. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AuthEnvelopedData.GetInstance(System.Object)">
  1498. return an AuthEnvelopedData object from the given object.
  1499. @param obj the object we want converted.
  1500. @throws ArgumentException if the object cannot be converted.
  1501. </member>
  1502. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AuthEnvelopedData.ToAsn1Object">
  1503. Produce an object suitable for an Asn1OutputStream.
  1504. <pre>
  1505. AuthEnvelopedData ::= SEQUENCE {
  1506. version CMSVersion,
  1507. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  1508. recipientInfos RecipientInfos,
  1509. authEncryptedContentInfo EncryptedContentInfo,
  1510. authAttrs [1] IMPLICIT AuthAttributes OPTIONAL,
  1511. mac MessageAuthenticationCode,
  1512. unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
  1513. </pre>
  1514. </member>
  1515. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AuthEnvelopedDataParser">
  1516. Produce an object suitable for an Asn1OutputStream.
  1517. <pre>
  1518. AuthEnvelopedData ::= SEQUENCE {
  1519. version CMSVersion,
  1520. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  1521. recipientInfos RecipientInfos,
  1522. authEncryptedContentInfo EncryptedContentInfo,
  1523. authAttrs [1] IMPLICIT AuthAttributes OPTIONAL,
  1524. mac MessageAuthenticationCode,
  1525. unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
  1526. </pre>
  1527. </member>
  1528. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.CmsObjectIdentifiers.id_ri">
  1529. The other Revocation Info arc
  1530. id-ri OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
  1531. dod(6) internet(1) security(5) mechanisms(5) pkix(7) ri(16) }
  1532. </member>
  1533. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.CompressedData">
  1534. RFC 3274 - CMS Compressed Data.
  1535. <pre>
  1536. CompressedData ::= Sequence {
  1537. version CMSVersion,
  1538. compressionAlgorithm CompressionAlgorithmIdentifier,
  1539. encapContentInfo EncapsulatedContentInfo
  1540. }
  1541. </pre>
  1542. </member>
  1543. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.CompressedData.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1544. return a CompressedData object from a tagged object.
  1545. @param ato the tagged object holding the object we want.
  1546. @param explicitly true if the object is meant to be explicitly
  1547. tagged false otherwise.
  1548. @exception ArgumentException if the object held by the
  1549. tagged object cannot be converted.
  1550. </member>
  1551. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.CompressedData.GetInstance(System.Object)">
  1552. return a CompressedData object from the given object.
  1553. @param _obj the object we want converted.
  1554. @exception ArgumentException if the object cannot be converted.
  1555. </member>
  1556. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.CompressedDataParser">
  1557. RFC 3274 - CMS Compressed Data.
  1558. <pre>
  1559. CompressedData ::= SEQUENCE {
  1560. version CMSVersion,
  1561. compressionAlgorithm CompressionAlgorithmIdentifier,
  1562. encapContentInfo EncapsulatedContentInfo
  1563. }
  1564. </pre>
  1565. </member>
  1566. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.ContentInfo.ToAsn1Object">
  1567. Produce an object suitable for an Asn1OutputStream.
  1568. <pre>
  1569. ContentInfo ::= Sequence {
  1570. contentType ContentType,
  1571. content
  1572. [0] EXPLICIT ANY DEFINED BY contentType OPTIONAL }
  1573. </pre>
  1574. </member>
  1575. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.ContentInfoParser">
  1576. Produce an object suitable for an Asn1OutputStream.
  1577. <pre>
  1578. ContentInfo ::= SEQUENCE {
  1579. contentType ContentType,
  1580. content
  1581. [0] EXPLICIT ANY DEFINED BY contentType OPTIONAL }
  1582. </pre>
  1583. </member>
  1584. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.Ecc.MQVuserKeyingMaterial.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1585. return an AuthEnvelopedData object from a tagged object.
  1586. @param obj the tagged object holding the object we want.
  1587. @param isExplicit true if the object is meant to be explicitly
  1588. tagged false otherwise.
  1589. @throws ArgumentException if the object held by the
  1590. tagged object cannot be converted.
  1591. </member>
  1592. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.Ecc.MQVuserKeyingMaterial.GetInstance(System.Object)">
  1593. return an AuthEnvelopedData object from the given object.
  1594. @param obj the object we want converted.
  1595. @throws ArgumentException if the object cannot be converted.
  1596. </member>
  1597. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.Ecc.MQVuserKeyingMaterial.ToAsn1Object">
  1598. Produce an object suitable for an Asn1OutputStream.
  1599. <pre>
  1600. MQVuserKeyingMaterial ::= SEQUENCE {
  1601. ephemeralPublicKey OriginatorPublicKey,
  1602. addedukm [0] EXPLICIT UserKeyingMaterial OPTIONAL }
  1603. </pre>
  1604. </member>
  1605. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.EncryptedContentInfo.GetInstance(System.Object)">
  1606. return an EncryptedContentInfo object from the given object.
  1607. @param obj the object we want converted.
  1608. @exception ArgumentException if the object cannot be converted.
  1609. </member>
  1610. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.EncryptedContentInfo.ToAsn1Object">
  1611. Produce an object suitable for an Asn1OutputStream.
  1612. <pre>
  1613. EncryptedContentInfo ::= Sequence {
  1614. contentType ContentType,
  1615. contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier,
  1616. encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL
  1617. }
  1618. </pre>
  1619. </member>
  1620. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.EncryptedContentInfoParser">
  1621. <pre>
  1622. EncryptedContentInfo ::= SEQUENCE {
  1623. contentType ContentType,
  1624. contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier,
  1625. encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL
  1626. }
  1627. </pre>
  1628. </member>
  1629. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.EncryptedData.ToAsn1Object">
  1630. <pre>
  1631. EncryptedData ::= SEQUENCE {
  1632. version CMSVersion,
  1633. encryptedContentInfo EncryptedContentInfo,
  1634. unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL }
  1635. </pre>
  1636. @return a basic ASN.1 object representation.
  1637. </member>
  1638. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.EnvelopedData.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1639. return an EnvelopedData object from a tagged object.
  1640. @param obj the tagged object holding the object we want.
  1641. @param explicitly true if the object is meant to be explicitly
  1642. tagged false otherwise.
  1643. @exception ArgumentException if the object held by the
  1644. tagged object cannot be converted.
  1645. </member>
  1646. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.EnvelopedData.GetInstance(System.Object)">
  1647. return an EnvelopedData object from the given object.
  1648. @param obj the object we want converted.
  1649. @exception ArgumentException if the object cannot be converted.
  1650. </member>
  1651. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.EnvelopedData.ToAsn1Object">
  1652. Produce an object suitable for an Asn1OutputStream.
  1653. <pre>
  1654. EnvelopedData ::= Sequence {
  1655. version CMSVersion,
  1656. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  1657. recipientInfos RecipientInfos,
  1658. encryptedContentInfo EncryptedContentInfo,
  1659. unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL
  1660. }
  1661. </pre>
  1662. </member>
  1663. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.EnvelopedDataParser">
  1664. Produce an object suitable for an Asn1OutputStream.
  1665. <pre>
  1666. EnvelopedData ::= SEQUENCE {
  1667. version CMSVersion,
  1668. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  1669. recipientInfos RecipientInfos,
  1670. encryptedContentInfo EncryptedContentInfo,
  1671. unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL
  1672. }
  1673. </pre>
  1674. </member>
  1675. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KekIdentifier.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1676. return a KekIdentifier object from a tagged object.
  1677. @param obj the tagged object holding the object we want.
  1678. @param explicitly true if the object is meant to be explicitly
  1679. tagged false otherwise.
  1680. @exception ArgumentException if the object held by the
  1681. tagged object cannot be converted.
  1682. </member>
  1683. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KekIdentifier.GetInstance(System.Object)">
  1684. return a KekIdentifier object from the given object.
  1685. @param obj the object we want converted.
  1686. @exception ArgumentException if the object cannot be converted.
  1687. </member>
  1688. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KekIdentifier.ToAsn1Object">
  1689. Produce an object suitable for an Asn1OutputStream.
  1690. <pre>
  1691. KekIdentifier ::= Sequence {
  1692. keyIdentifier OCTET STRING,
  1693. date GeneralizedTime OPTIONAL,
  1694. other OtherKeyAttribute OPTIONAL
  1695. }
  1696. </pre>
  1697. </member>
  1698. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KekRecipientInfo.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1699. return a KekRecipientInfo object from a tagged object.
  1700. @param obj the tagged object holding the object we want.
  1701. @param explicitly true if the object is meant to be explicitly
  1702. tagged false otherwise.
  1703. @exception ArgumentException if the object held by the
  1704. tagged object cannot be converted.
  1705. </member>
  1706. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KekRecipientInfo.GetInstance(System.Object)">
  1707. return a KekRecipientInfo object from the given object.
  1708. @param obj the object we want converted.
  1709. @exception ArgumentException if the object cannot be converted.
  1710. </member>
  1711. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KekRecipientInfo.ToAsn1Object">
  1712. Produce an object suitable for an Asn1OutputStream.
  1713. <pre>
  1714. KekRecipientInfo ::= Sequence {
  1715. version CMSVersion, -- always set to 4
  1716. kekID KekIdentifier,
  1717. keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
  1718. encryptedKey EncryptedKey
  1719. }
  1720. </pre>
  1721. </member>
  1722. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientIdentifier.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1723. return an KeyAgreeRecipientIdentifier object from a tagged object.
  1724. @param obj the tagged object holding the object we want.
  1725. @param isExplicit true if the object is meant to be explicitly
  1726. tagged false otherwise.
  1727. @exception ArgumentException if the object held by the
  1728. tagged object cannot be converted.
  1729. </member>
  1730. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientIdentifier.GetInstance(System.Object)">
  1731. return an KeyAgreeRecipientIdentifier object from the given object.
  1732. @param obj the object we want converted.
  1733. @exception ArgumentException if the object cannot be converted.
  1734. </member>
  1735. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientIdentifier.ToAsn1Object">
  1736. Produce an object suitable for an Asn1OutputStream.
  1737. <pre>
  1738. KeyAgreeRecipientIdentifier ::= CHOICE {
  1739. issuerAndSerialNumber IssuerAndSerialNumber,
  1740. rKeyId [0] IMPLICIT RecipientKeyIdentifier
  1741. }
  1742. </pre>
  1743. </member>
  1744. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientInfo.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1745. return a KeyAgreeRecipientInfo object from a tagged object.
  1746. @param obj the tagged object holding the object we want.
  1747. @param explicitly true if the object is meant to be explicitly
  1748. tagged false otherwise.
  1749. @exception ArgumentException if the object held by the
  1750. tagged object cannot be converted.
  1751. </member>
  1752. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientInfo.GetInstance(System.Object)">
  1753. return a KeyAgreeRecipientInfo object from the given object.
  1754. @param obj the object we want converted.
  1755. @exception ArgumentException if the object cannot be converted.
  1756. </member>
  1757. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientInfo.ToAsn1Object">
  1758. * Produce an object suitable for an Asn1OutputStream.
  1759. * <pre>
  1760. * KeyAgreeRecipientInfo ::= Sequence {
  1761. * version CMSVersion, -- always set to 3
  1762. * originator [0] EXPLICIT OriginatorIdentifierOrKey,
  1763. * ukm [1] EXPLICIT UserKeyingMaterial OPTIONAL,
  1764. * keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
  1765. * recipientEncryptedKeys RecipientEncryptedKeys
  1766. * }
  1767. *
  1768. * UserKeyingMaterial ::= OCTET STRING
  1769. * </pre>
  1770. </member>
  1771. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KeyTransRecipientInfo.GetInstance(System.Object)">
  1772. return a KeyTransRecipientInfo object from the given object.
  1773. @param obj the object we want converted.
  1774. @exception ArgumentException if the object cannot be converted.
  1775. </member>
  1776. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KeyTransRecipientInfo.ToAsn1Object">
  1777. Produce an object suitable for an Asn1OutputStream.
  1778. <pre>
  1779. KeyTransRecipientInfo ::= Sequence {
  1780. version CMSVersion, -- always set to 0 or 2
  1781. rid RecipientIdentifier,
  1782. keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
  1783. encryptedKey EncryptedKey
  1784. }
  1785. </pre>
  1786. </member>
  1787. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.MetaData.ToAsn1Object">
  1788. <pre>
  1789. MetaData ::= SEQUENCE {
  1790. hashProtected BOOLEAN,
  1791. fileName UTF8String OPTIONAL,
  1792. mediaType IA5String OPTIONAL,
  1793. otherMetaData Attributes OPTIONAL
  1794. }
  1795. </pre>
  1796. @return
  1797. </member>
  1798. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OriginatorIdentifierOrKey.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1799. return an OriginatorIdentifierOrKey object from a tagged object.
  1800. @param o the tagged object holding the object we want.
  1801. @param explicitly true if the object is meant to be explicitly
  1802. tagged false otherwise.
  1803. @exception ArgumentException if the object held by the
  1804. tagged object cannot be converted.
  1805. </member>
  1806. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OriginatorIdentifierOrKey.GetInstance(System.Object)">
  1807. return an OriginatorIdentifierOrKey object from the given object.
  1808. @param o the object we want converted.
  1809. @exception ArgumentException if the object cannot be converted.
  1810. </member>
  1811. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OriginatorIdentifierOrKey.ToAsn1Object">
  1812. Produce an object suitable for an Asn1OutputStream.
  1813. <pre>
  1814. OriginatorIdentifierOrKey ::= CHOICE {
  1815. issuerAndSerialNumber IssuerAndSerialNumber,
  1816. subjectKeyIdentifier [0] SubjectKeyIdentifier,
  1817. originatorKey [1] OriginatorPublicKey
  1818. }
  1819. SubjectKeyIdentifier ::= OCTET STRING
  1820. </pre>
  1821. </member>
  1822. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OriginatorInfo.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1823. return an OriginatorInfo object from a tagged object.
  1824. @param obj the tagged object holding the object we want.
  1825. @param explicitly true if the object is meant to be explicitly
  1826. tagged false otherwise.
  1827. @exception ArgumentException if the object held by the
  1828. tagged object cannot be converted.
  1829. </member>
  1830. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OriginatorInfo.GetInstance(System.Object)">
  1831. return an OriginatorInfo object from the given object.
  1832. @param obj the object we want converted.
  1833. @exception ArgumentException if the object cannot be converted.
  1834. </member>
  1835. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OriginatorInfo.ToAsn1Object">
  1836. Produce an object suitable for an Asn1OutputStream.
  1837. <pre>
  1838. OriginatorInfo ::= Sequence {
  1839. certs [0] IMPLICIT CertificateSet OPTIONAL,
  1840. crls [1] IMPLICIT CertificateRevocationLists OPTIONAL
  1841. }
  1842. </pre>
  1843. </member>
  1844. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OriginatorPublicKey.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1845. return an OriginatorPublicKey object from a tagged object.
  1846. @param obj the tagged object holding the object we want.
  1847. @param explicitly true if the object is meant to be explicitly
  1848. tagged false otherwise.
  1849. @exception ArgumentException if the object held by the
  1850. tagged object cannot be converted.
  1851. </member>
  1852. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OriginatorPublicKey.GetInstance(System.Object)">
  1853. return an OriginatorPublicKey object from the given object.
  1854. @param obj the object we want converted.
  1855. @exception ArgumentException if the object cannot be converted.
  1856. </member>
  1857. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OriginatorPublicKey.ToAsn1Object">
  1858. Produce an object suitable for an Asn1OutputStream.
  1859. <pre>
  1860. OriginatorPublicKey ::= Sequence {
  1861. algorithm AlgorithmIdentifier,
  1862. publicKey BIT STRING
  1863. }
  1864. </pre>
  1865. </member>
  1866. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OtherKeyAttribute.GetInstance(System.Object)">
  1867. return an OtherKeyAttribute object from the given object.
  1868. @param o the object we want converted.
  1869. @exception ArgumentException if the object cannot be converted.
  1870. </member>
  1871. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OtherKeyAttribute.ToAsn1Object">
  1872. Produce an object suitable for an Asn1OutputStream.
  1873. <pre>
  1874. OtherKeyAttribute ::= Sequence {
  1875. keyAttrId OBJECT IDENTIFIER,
  1876. keyAttr ANY DEFINED BY keyAttrId OPTIONAL
  1877. }
  1878. </pre>
  1879. </member>
  1880. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OtherRecipientInfo.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1881. return a OtherRecipientInfo object from a tagged object.
  1882. @param obj the tagged object holding the object we want.
  1883. @param explicitly true if the object is meant to be explicitly
  1884. tagged false otherwise.
  1885. @exception ArgumentException if the object held by the
  1886. tagged object cannot be converted.
  1887. </member>
  1888. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OtherRecipientInfo.GetInstance(System.Object)">
  1889. return a OtherRecipientInfo object from the given object.
  1890. @param obj the object we want converted.
  1891. @exception ArgumentException if the object cannot be converted.
  1892. </member>
  1893. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OtherRecipientInfo.ToAsn1Object">
  1894. Produce an object suitable for an Asn1OutputStream.
  1895. <pre>
  1896. OtherRecipientInfo ::= Sequence {
  1897. oriType OBJECT IDENTIFIER,
  1898. oriValue ANY DEFINED BY oriType }
  1899. </pre>
  1900. </member>
  1901. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OtherRevocationInfoFormat.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1902. return a OtherRevocationInfoFormat object from a tagged object.
  1903. @param obj the tagged object holding the object we want.
  1904. @param explicit true if the object is meant to be explicitly
  1905. tagged false otherwise.
  1906. @exception IllegalArgumentException if the object held by the
  1907. tagged object cannot be converted.
  1908. </member>
  1909. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OtherRevocationInfoFormat.GetInstance(System.Object)">
  1910. return a OtherRevocationInfoFormat object from the given object.
  1911. @param obj the object we want converted.
  1912. @exception IllegalArgumentException if the object cannot be converted.
  1913. </member>
  1914. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.OtherRevocationInfoFormat.ToAsn1Object">
  1915. Produce an object suitable for an ASN1OutputStream.
  1916. <pre>
  1917. OtherRevocationInfoFormat ::= SEQUENCE {
  1918. otherRevInfoFormat OBJECT IDENTIFIER,
  1919. otherRevInfo ANY DEFINED BY otherRevInfoFormat }
  1920. </pre>
  1921. </member>
  1922. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.PasswordRecipientInfo.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1923. return a PasswordRecipientInfo object from a tagged object.
  1924. @param obj the tagged object holding the object we want.
  1925. @param explicitly true if the object is meant to be explicitly
  1926. tagged false otherwise.
  1927. @exception ArgumentException if the object held by the
  1928. tagged object cannot be converted.
  1929. </member>
  1930. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.PasswordRecipientInfo.GetInstance(System.Object)">
  1931. return a PasswordRecipientInfo object from the given object.
  1932. @param obj the object we want converted.
  1933. @exception ArgumentException if the object cannot be converted.
  1934. </member>
  1935. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.PasswordRecipientInfo.ToAsn1Object">
  1936. Produce an object suitable for an Asn1OutputStream.
  1937. <pre>
  1938. PasswordRecipientInfo ::= Sequence {
  1939. version CMSVersion, -- Always set to 0
  1940. keyDerivationAlgorithm [0] KeyDerivationAlgorithmIdentifier
  1941. OPTIONAL,
  1942. keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
  1943. encryptedKey EncryptedKey }
  1944. </pre>
  1945. </member>
  1946. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.RecipientEncryptedKey.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1947. return an RecipientEncryptedKey object from a tagged object.
  1948. @param obj the tagged object holding the object we want.
  1949. @param isExplicit true if the object is meant to be explicitly
  1950. tagged false otherwise.
  1951. @exception ArgumentException if the object held by the
  1952. tagged object cannot be converted.
  1953. </member>
  1954. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.RecipientEncryptedKey.GetInstance(System.Object)">
  1955. return a RecipientEncryptedKey object from the given object.
  1956. @param obj the object we want converted.
  1957. @exception ArgumentException if the object cannot be converted.
  1958. </member>
  1959. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.RecipientEncryptedKey.ToAsn1Object">
  1960. Produce an object suitable for an Asn1OutputStream.
  1961. <pre>
  1962. RecipientEncryptedKey ::= SEQUENCE {
  1963. rid KeyAgreeRecipientIdentifier,
  1964. encryptedKey EncryptedKey
  1965. }
  1966. </pre>
  1967. </member>
  1968. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.RecipientIdentifier.GetInstance(System.Object)">
  1969. return a RecipientIdentifier object from the given object.
  1970. @param o the object we want converted.
  1971. @exception ArgumentException if the object cannot be converted.
  1972. </member>
  1973. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.RecipientIdentifier.ToAsn1Object">
  1974. Produce an object suitable for an Asn1OutputStream.
  1975. <pre>
  1976. RecipientIdentifier ::= CHOICE {
  1977. issuerAndSerialNumber IssuerAndSerialNumber,
  1978. subjectKeyIdentifier [0] SubjectKeyIdentifier
  1979. }
  1980. SubjectKeyIdentifier ::= OCTET STRING
  1981. </pre>
  1982. </member>
  1983. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.RecipientInfo.ToAsn1Object">
  1984. Produce an object suitable for an Asn1OutputStream.
  1985. <pre>
  1986. RecipientInfo ::= CHOICE {
  1987. ktri KeyTransRecipientInfo,
  1988. kari [1] KeyAgreeRecipientInfo,
  1989. kekri [2] KekRecipientInfo,
  1990. pwri [3] PasswordRecipientInfo,
  1991. ori [4] OtherRecipientInfo }
  1992. </pre>
  1993. </member>
  1994. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.RecipientKeyIdentifier.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1995. return a RecipientKeyIdentifier object from a tagged object.
  1996. @param _ato the tagged object holding the object we want.
  1997. @param _explicit true if the object is meant to be explicitly
  1998. tagged false otherwise.
  1999. @exception ArgumentException if the object held by the
  2000. tagged object cannot be converted.
  2001. </member>
  2002. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.RecipientKeyIdentifier.GetInstance(System.Object)">
  2003. return a RecipientKeyIdentifier object from the given object.
  2004. @param _obj the object we want converted.
  2005. @exception ArgumentException if the object cannot be converted.
  2006. </member>
  2007. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.RecipientKeyIdentifier.ToAsn1Object">
  2008. Produce an object suitable for an Asn1OutputStream.
  2009. <pre>
  2010. RecipientKeyIdentifier ::= Sequence {
  2011. subjectKeyIdentifier SubjectKeyIdentifier,
  2012. date GeneralizedTime OPTIONAL,
  2013. other OtherKeyAttribute OPTIONAL
  2014. }
  2015. SubjectKeyIdentifier ::= OCTET STRING
  2016. </pre>
  2017. </member>
  2018. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.ScvpReqRes.ToAsn1Object">
  2019. <pre>
  2020. ScvpReqRes ::= SEQUENCE {
  2021. request [0] EXPLICIT ContentInfo OPTIONAL,
  2022. response ContentInfo }
  2023. </pre>
  2024. @return the ASN.1 primitive representation.
  2025. </member>
  2026. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.SignedData">
  2027. a signed data object.
  2028. </member>
  2029. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.SignedData.ToAsn1Object">
  2030. Produce an object suitable for an Asn1OutputStream.
  2031. <pre>
  2032. SignedData ::= Sequence {
  2033. version CMSVersion,
  2034. digestAlgorithms DigestAlgorithmIdentifiers,
  2035. encapContentInfo EncapsulatedContentInfo,
  2036. certificates [0] IMPLICIT CertificateSet OPTIONAL,
  2037. crls [1] IMPLICIT CertificateRevocationLists OPTIONAL,
  2038. signerInfos SignerInfos
  2039. }
  2040. </pre>
  2041. </member>
  2042. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.SignedDataParser">
  2043. <pre>
  2044. SignedData ::= SEQUENCE {
  2045. version CMSVersion,
  2046. digestAlgorithms DigestAlgorithmIdentifiers,
  2047. encapContentInfo EncapsulatedContentInfo,
  2048. certificates [0] IMPLICIT CertificateSet OPTIONAL,
  2049. crls [1] IMPLICIT CertificateRevocationLists OPTIONAL,
  2050. signerInfos SignerInfos
  2051. }
  2052. </pre>
  2053. </member>
  2054. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.SignerIdentifier.GetInstance(System.Object)">
  2055. return a SignerIdentifier object from the given object.
  2056. @param o the object we want converted.
  2057. @exception ArgumentException if the object cannot be converted.
  2058. </member>
  2059. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.SignerIdentifier.ToAsn1Object">
  2060. Produce an object suitable for an Asn1OutputStream.
  2061. <pre>
  2062. SignerIdentifier ::= CHOICE {
  2063. issuerAndSerialNumber IssuerAndSerialNumber,
  2064. subjectKeyIdentifier [0] SubjectKeyIdentifier
  2065. }
  2066. SubjectKeyIdentifier ::= OCTET STRING
  2067. </pre>
  2068. </member>
  2069. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.SignerInfo.ToAsn1Object">
  2070. Produce an object suitable for an Asn1OutputStream.
  2071. <pre>
  2072. SignerInfo ::= Sequence {
  2073. version Version,
  2074. SignerIdentifier sid,
  2075. digestAlgorithm DigestAlgorithmIdentifier,
  2076. authenticatedAttributes [0] IMPLICIT Attributes OPTIONAL,
  2077. digestEncryptionAlgorithm DigestEncryptionAlgorithmIdentifier,
  2078. encryptedDigest EncryptedDigest,
  2079. unauthenticatedAttributes [1] IMPLICIT Attributes OPTIONAL
  2080. }
  2081. EncryptedDigest ::= OCTET STRING
  2082. DigestAlgorithmIdentifier ::= AlgorithmIdentifier
  2083. DigestEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
  2084. </pre>
  2085. </member>
  2086. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.Time.#ctor(System.DateTime)">
  2087. creates a time object from a given date - if the date is between 1950
  2088. and 2049 a UTCTime object is Generated, otherwise a GeneralizedTime
  2089. is used.
  2090. </member>
  2091. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.Time.ToAsn1Object">
  2092. Produce an object suitable for an Asn1OutputStream.
  2093. <pre>
  2094. Time ::= CHOICE {
  2095. utcTime UTCTime,
  2096. generalTime GeneralizedTime }
  2097. </pre>
  2098. </member>
  2099. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.TimeStampAndCrl.ToAsn1Object">
  2100. <pre>
  2101. TimeStampAndCRL ::= SEQUENCE {
  2102. timeStamp TimeStampToken, -- according to RFC 3161
  2103. crl CertificateList OPTIONAL -- according to RFC 5280
  2104. }
  2105. </pre>
  2106. @return
  2107. </member>
  2108. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.TimeStampedData.ToAsn1Object">
  2109. <pre>
  2110. TimeStampedData ::= SEQUENCE {
  2111. version INTEGER { v1(1) },
  2112. dataUri IA5String OPTIONAL,
  2113. metaData MetaData OPTIONAL,
  2114. content OCTET STRING OPTIONAL,
  2115. temporalEvidence Evidence
  2116. }
  2117. </pre>
  2118. @return
  2119. </member>
  2120. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.TimeStampTokenEvidence.ToAsn1Object">
  2121. <pre>
  2122. TimeStampTokenEvidence ::=
  2123. SEQUENCE SIZE(1..MAX) OF TimeStampAndCrl
  2124. </pre>
  2125. @return
  2126. </member>
  2127. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.AttributeTypeAndValue.ToAsn1Object">
  2128. <pre>
  2129. AttributeTypeAndValue ::= SEQUENCE {
  2130. type OBJECT IDENTIFIER,
  2131. value ANY DEFINED BY type }
  2132. </pre>
  2133. @return a basic ASN.1 object representation.
  2134. </member>
  2135. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.CertId.ToAsn1Object">
  2136. <pre>
  2137. CertId ::= SEQUENCE {
  2138. issuer GeneralName,
  2139. serialNumber INTEGER }
  2140. </pre>
  2141. @return a basic ASN.1 object representation.
  2142. </member>
  2143. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.CertReqMessages.ToAsn1Object">
  2144. <pre>
  2145. CertReqMessages ::= SEQUENCE SIZE (1..MAX) OF CertReqMsg
  2146. </pre>
  2147. @return a basic ASN.1 object representation.
  2148. </member>
  2149. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.CertReqMsg.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.CertRequest,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.ProofOfPossession,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.AttributeTypeAndValue[])">
  2150. Creates a new CertReqMsg.
  2151. @param certReq CertRequest
  2152. @param popo may be null
  2153. @param regInfo may be null
  2154. </member>
  2155. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.CertReqMsg.ToAsn1Object">
  2156. <pre>
  2157. CertReqMsg ::= SEQUENCE {
  2158. certReq CertRequest,
  2159. pop ProofOfPossession OPTIONAL,
  2160. -- content depends upon key type
  2161. regInfo SEQUENCE SIZE(1..MAX) OF AttributeTypeAndValue OPTIONAL }
  2162. </pre>
  2163. @return a basic ASN.1 object representation.
  2164. </member>
  2165. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.CertRequest.ToAsn1Object">
  2166. <pre>
  2167. CertRequest ::= SEQUENCE {
  2168. certReqId INTEGER, -- ID for matching request and reply
  2169. certTemplate CertTemplate, -- Selected fields of cert to be issued
  2170. controls Controls OPTIONAL } -- Attributes affecting issuance
  2171. </pre>
  2172. @return a basic ASN.1 object representation.
  2173. </member>
  2174. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.CertTemplate.ToAsn1Object">
  2175. <pre>
  2176. CertTemplate ::= SEQUENCE {
  2177. version [0] Version OPTIONAL,
  2178. serialNumber [1] INTEGER OPTIONAL,
  2179. signingAlg [2] AlgorithmIdentifier OPTIONAL,
  2180. issuer [3] Name OPTIONAL,
  2181. validity [4] OptionalValidity OPTIONAL,
  2182. subject [5] Name OPTIONAL,
  2183. publicKey [6] SubjectPublicKeyInfo OPTIONAL,
  2184. issuerUID [7] UniqueIdentifier OPTIONAL,
  2185. subjectUID [8] UniqueIdentifier OPTIONAL,
  2186. extensions [9] Extensions OPTIONAL }
  2187. </pre>
  2188. @return a basic ASN.1 object representation.
  2189. </member>
  2190. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.CertTemplateBuilder.SetVersion(System.Int32)">
  2191. Sets the X.509 version. Note: for X509v3, use 2 here.
  2192. </member>
  2193. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.CertTemplateBuilder.SetIssuerUID(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBitString)">
  2194. Sets the issuer unique ID (deprecated in X.509v3)
  2195. </member>
  2196. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.CertTemplateBuilder.SetSubjectUID(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBitString)">
  2197. Sets the subject unique ID (deprecated in X.509v3)
  2198. </member>
  2199. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.CertTemplateBuilder.Build">
  2200. <pre>
  2201. CertTemplate ::= SEQUENCE {
  2202. version [0] Version OPTIONAL,
  2203. serialNumber [1] INTEGER OPTIONAL,
  2204. signingAlg [2] AlgorithmIdentifier OPTIONAL,
  2205. issuer [3] Name OPTIONAL,
  2206. validity [4] OptionalValidity OPTIONAL,
  2207. subject [5] Name OPTIONAL,
  2208. publicKey [6] SubjectPublicKeyInfo OPTIONAL,
  2209. issuerUID [7] UniqueIdentifier OPTIONAL,
  2210. subjectUID [8] UniqueIdentifier OPTIONAL,
  2211. extensions [9] Extensions OPTIONAL }
  2212. </pre>
  2213. @return a basic ASN.1 object representation.
  2214. </member>
  2215. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.Controls.ToAsn1Object">
  2216. <pre>
  2217. Controls ::= SEQUENCE SIZE(1..MAX) OF AttributeTypeAndValue
  2218. </pre>
  2219. @return a basic ASN.1 object representation.
  2220. </member>
  2221. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.EncKeyWithID.ToAsn1Object">
  2222. <pre>
  2223. EncKeyWithID ::= SEQUENCE {
  2224. privateKey PrivateKeyInfo,
  2225. identifier CHOICE {
  2226. string UTF8String,
  2227. generalName GeneralName
  2228. } OPTIONAL
  2229. }
  2230. </pre>
  2231. @return
  2232. </member>
  2233. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.EncryptedKey.ToAsn1Object">
  2234. <pre>
  2235. EncryptedKey ::= CHOICE {
  2236. encryptedValue EncryptedValue, -- deprecated
  2237. envelopedData [0] EnvelopedData }
  2238. -- The encrypted private key MUST be placed in the envelopedData
  2239. -- encryptedContentInfo encryptedContent OCTET STRING.
  2240. </pre>
  2241. </member>
  2242. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.EncryptedValue.ToAsn1Object">
  2243. <pre>
  2244. (IMPLICIT TAGS)
  2245. EncryptedValue ::= SEQUENCE {
  2246. intendedAlg [0] AlgorithmIdentifier OPTIONAL,
  2247. -- the intended algorithm for which the value will be used
  2248. symmAlg [1] AlgorithmIdentifier OPTIONAL,
  2249. -- the symmetric algorithm used to encrypt the value
  2250. encSymmKey [2] BIT STRING OPTIONAL,
  2251. -- the (encrypted) symmetric key used to encrypt the value
  2252. keyAlg [3] AlgorithmIdentifier OPTIONAL,
  2253. -- algorithm used to encrypt the symmetric key
  2254. valueHint [4] OCTET STRING OPTIONAL,
  2255. -- a brief description or identifier of the encValue content
  2256. -- (may be meaningful only to the sending entity, and used only
  2257. -- if EncryptedValue might be re-examined by the sending entity
  2258. -- in the future)
  2259. encValue BIT STRING }
  2260. -- the encrypted value itself
  2261. </pre>
  2262. @return a basic ASN.1 object representation.
  2263. </member>
  2264. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.OptionalValidity.ToAsn1Object">
  2265. <pre>
  2266. OptionalValidity ::= SEQUENCE {
  2267. notBefore [0] Time OPTIONAL,
  2268. notAfter [1] Time OPTIONAL } --at least one MUST be present
  2269. </pre>
  2270. @return a basic ASN.1 object representation.
  2271. </member>
  2272. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PkiArchiveOptions.ToAsn1Object">
  2273. <pre>
  2274. PkiArchiveOptions ::= CHOICE {
  2275. encryptedPrivKey [0] EncryptedKey,
  2276. -- the actual value of the private key
  2277. keyGenParameters [1] KeyGenParameters,
  2278. -- parameters which allow the private key to be re-generated
  2279. archiveRemGenPrivKey [2] BOOLEAN }
  2280. -- set to TRUE if sender wishes receiver to archive the private
  2281. -- key of a key pair that the receiver generates in response to
  2282. -- this request; set to FALSE if no archival is desired.
  2283. </pre>
  2284. </member>
  2285. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PkiPublicationInfo">
  2286. <pre>
  2287. PKIPublicationInfo ::= SEQUENCE {
  2288. action INTEGER {
  2289. dontPublish (0),
  2290. pleasePublish (1) },
  2291. pubInfos SEQUENCE SIZE (1..MAX) OF SinglePubInfo OPTIONAL }
  2292. -- pubInfos MUST NOT be present if action is "dontPublish"
  2293. -- (if action is "pleasePublish" and pubInfos is omitted,
  2294. -- "dontCare" is assumed)
  2295. </pre>
  2296. </member>
  2297. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PkiPublicationInfo.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.SinglePubInfo)">
  2298. Constructor with a single pubInfo, assumes pleasePublish as the action.
  2299. @param pubInfo the pubInfo to be published (can be null if don't care is required).
  2300. </member>
  2301. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PkiPublicationInfo.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.SinglePubInfo[])">
  2302. Constructor with multiple pubInfo, assumes pleasePublish as the action.
  2303. @param pubInfos the pubInfos to be published (can be null if don't care is required).
  2304. </member>
  2305. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PkiPublicationInfo.ToAsn1Object">
  2306. <pre>
  2307. PkiPublicationInfo ::= SEQUENCE {
  2308. action INTEGER {
  2309. dontPublish (0),
  2310. pleasePublish (1) },
  2311. pubInfos SEQUENCE SIZE (1..MAX) OF SinglePubInfo OPTIONAL }
  2312. -- pubInfos MUST NOT be present if action is "dontPublish"
  2313. -- (if action is "pleasePublish" and pubInfos is omitted,
  2314. -- "dontCare" is assumed)
  2315. </pre>
  2316. @return a basic ASN.1 object representation.
  2317. </member>
  2318. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PKMacValue">
  2319. Password-based MAC value for use with POPOSigningKeyInput.
  2320. </member>
  2321. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PKMacValue.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PbmParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBitString)">
  2322. Creates a new PKMACValue.
  2323. @param params parameters for password-based MAC
  2324. @param value MAC of the DER-encoded SubjectPublicKeyInfo
  2325. </member>
  2326. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PKMacValue.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBitString)">
  2327. Creates a new PKMACValue.
  2328. @param aid CMPObjectIdentifiers.passwordBasedMAC, with PBMParameter
  2329. @param value MAC of the DER-encoded SubjectPublicKeyInfo
  2330. </member>
  2331. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PKMacValue.ToAsn1Object">
  2332. <pre>
  2333. PKMACValue ::= SEQUENCE {
  2334. algId AlgorithmIdentifier,
  2335. -- algorithm value shall be PasswordBasedMac 1.2.840.113533.7.66.13
  2336. -- parameter value is PBMParameter
  2337. value BIT STRING }
  2338. </pre>
  2339. @return a basic ASN.1 object representation.
  2340. </member>
  2341. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PopoPrivKey.ToAsn1Object">
  2342. <pre>
  2343. PopoPrivKey ::= CHOICE {
  2344. thisMessage [0] BIT STRING, -- Deprecated
  2345. -- possession is proven in this message (which contains the private
  2346. -- key itself (encrypted for the CA))
  2347. subsequentMessage [1] SubsequentMessage,
  2348. -- possession will be proven in a subsequent message
  2349. dhMAC [2] BIT STRING, -- Deprecated
  2350. agreeMAC [3] PKMACValue,
  2351. encryptedKey [4] EnvelopedData }
  2352. </pre>
  2353. </member>
  2354. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PopoSigningKey.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBitString)">
  2355. Creates a new Proof of Possession object for a signing key.
  2356. @param poposkIn the PopoSigningKeyInput structure, or null if the
  2357. CertTemplate includes both subject and publicKey values.
  2358. @param aid the AlgorithmIdentifier used to sign the proof of possession.
  2359. @param signature a signature over the DER-encoded value of poposkIn,
  2360. or the DER-encoded value of certReq if poposkIn is null.
  2361. </member>
  2362. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PopoSigningKey.ToAsn1Object">
  2363. <pre>
  2364. PopoSigningKey ::= SEQUENCE {
  2365. poposkInput [0] PopoSigningKeyInput OPTIONAL,
  2366. algorithmIdentifier AlgorithmIdentifier,
  2367. signature BIT STRING }
  2368. -- The signature (using "algorithmIdentifier") is on the
  2369. -- DER-encoded value of poposkInput. NOTE: If the CertReqMsg
  2370. -- certReq CertTemplate contains the subject and publicKey values,
  2371. -- then poposkInput MUST be omitted and the signature MUST be
  2372. -- computed on the DER-encoded value of CertReqMsg certReq. If
  2373. -- the CertReqMsg certReq CertTemplate does not contain the public
  2374. -- key and subject values, then poposkInput MUST be present and
  2375. -- MUST be signed. This strategy ensures that the public key is
  2376. -- not present in both the poposkInput and CertReqMsg certReq
  2377. -- CertTemplate fields.
  2378. </pre>
  2379. @return a basic ASN.1 object representation.
  2380. </member>
  2381. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  2382. Creates a new PopoSigningKeyInput with sender name as authInfo.
  2383. </member>
  2384. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PKMacValue,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  2385. Creates a new PopoSigningKeyInput using password-based MAC.
  2386. </member>
  2387. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput.Sender">
  2388. Returns the sender field, or null if authInfo is publicKeyMac
  2389. </member>
  2390. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput.PublicKeyMac">
  2391. Returns the publicKeyMac field, or null if authInfo is sender
  2392. </member>
  2393. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput.ToAsn1Object">
  2394. <pre>
  2395. PopoSigningKeyInput ::= SEQUENCE {
  2396. authInfo CHOICE {
  2397. sender [0] GeneralName,
  2398. -- used only if an authenticated identity has been
  2399. -- established for the sender (e.g., a DN from a
  2400. -- previously-issued and currently-valid certificate
  2401. publicKeyMac PKMacValue },
  2402. -- used if no authenticated GeneralName currently exists for
  2403. -- the sender; publicKeyMac contains a password-based MAC
  2404. -- on the DER-encoded value of publicKey
  2405. publicKey SubjectPublicKeyInfo } -- from CertTemplate
  2406. </pre>
  2407. @return a basic ASN.1 object representation.
  2408. </member>
  2409. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.#ctor">
  2410. Creates a ProofOfPossession with type raVerified.
  2411. </member>
  2412. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PopoSigningKey)">
  2413. Creates a ProofOfPossession for a signing key.
  2414. </member>
  2415. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.#ctor(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PopoPrivKey)">
  2416. Creates a ProofOfPossession for key encipherment or agreement.
  2417. @param type one of TYPE_KEY_ENCIPHERMENT or TYPE_KEY_AGREEMENT
  2418. </member>
  2419. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.ToAsn1Object">
  2420. <pre>
  2421. ProofOfPossession ::= CHOICE {
  2422. raVerified [0] NULL,
  2423. -- used if the RA has already verified that the requester is in
  2424. -- possession of the private key
  2425. signature [1] PopoSigningKey,
  2426. keyEncipherment [2] PopoPrivKey,
  2427. keyAgreement [3] PopoPrivKey }
  2428. </pre>
  2429. @return a basic ASN.1 object representation.
  2430. </member>
  2431. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.SinglePubInfo.ToAsn1Object">
  2432. <pre>
  2433. SinglePubInfo ::= SEQUENCE {
  2434. pubMethod INTEGER {
  2435. dontCare (0),
  2436. x500 (1),
  2437. web (2),
  2438. ldap (3) },
  2439. pubLocation GeneralName OPTIONAL }
  2440. </pre>
  2441. @return a basic ASN.1 object representation.
  2442. </member>
  2443. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves">
  2444. <summary>Elliptic curve registry for GOST 3410-2001 / 2012.</summary>
  2445. </member>
  2446. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves.GetByName(System.String)">
  2447. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given name.</summary>
  2448. <param name="name">The name of the curve.</param>
  2449. </member>
  2450. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves.GetByNameLazy(System.String)">
  2451. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given name.</summary>
  2452. <remarks>
  2453. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  2454. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  2455. </remarks>
  2456. <param name="name">The name of the curve.</param>
  2457. </member>
  2458. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves.GetByOid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  2459. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given
  2460. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  2461. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  2462. </member>
  2463. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves.GetByOidLazy(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  2464. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given
  2465. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  2466. <remarks>
  2467. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  2468. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  2469. </remarks>
  2470. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  2471. </member>
  2472. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves.GetName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  2473. <summary>Look up the name of the curve with the given <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  2474. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  2475. </member>
  2476. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves.GetOid(System.String)">
  2477. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> of the curve with the given name.</summary>
  2478. <param name="name">The name of the curve.</param>
  2479. </member>
  2480. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves.Names">
  2481. <summary>Enumerate the available curve names in this registry.</summary>
  2482. </member>
  2483. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.Gost28147Parameters.ToAsn1Object">
  2484. <pre>
  2485. Gost28147-89-Parameters ::=
  2486. SEQUENCE {
  2487. iv Gost28147-89-IV,
  2488. encryptionParamSet OBJECT IDENTIFIER
  2489. }
  2490. Gost28147-89-IV ::= OCTET STRING (SIZE (8))
  2491. </pre>
  2492. </member>
  2493. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.Gost3410NamedParameters">
  2494. <summary>Registry of available named parameters for GOST 3410-94.</summary>
  2495. </member>
  2496. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.Gost3410NamedParameters.GetByName(System.String)">
  2497. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.Gost3410ParamSetParameters"/> for the parameter set with the given name.
  2498. </summary>
  2499. <param name="name">The name of the parameter set.</param>
  2500. </member>
  2501. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.Gost3410NamedParameters.GetByOid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  2502. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.Gost3410ParamSetParameters"/> for the parameter set with the given
  2503. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  2504. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the parameter set.</param>
  2505. </member>
  2506. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.Gost3410NamedParameters.GetOid(System.String)">
  2507. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> of the parameter set with the given name.
  2508. </summary>
  2509. <param name="name">The name of the parameter set.</param>
  2510. </member>
  2511. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro.Gost3410NamedParameters.Names">
  2512. <summary>Enumerate the available parameter set names in this registry.</summary>
  2513. </member>
  2514. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBitString.GetInstance(System.Object)">
  2515. return a Bit string from the passed in object
  2516. @exception ArgumentException if the object cannot be converted.
  2517. </member>
  2518. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBitString.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2519. return a Bit string from a tagged object.
  2520. @param obj the tagged object holding the object we want
  2521. @param explicitly true if the object is meant to be explicitly
  2522. tagged false otherwise.
  2523. @exception ArgumentException if the tagged object cannot
  2524. be converted.
  2525. </member>
  2526. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBitString.#ctor(System.Byte[],System.Int32)">
  2527. @param data the octets making up the bit string.
  2528. @param padBits the number of extra bits at the end of the string.
  2529. </member>
  2530. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBitString.GetOctets">
  2531. Return the octets contained in this BIT STRING, checking that this BIT STRING really
  2532. does represent an octet aligned string. Only use this method when the standard you are
  2533. following dictates that the BIT STRING will be octet aligned.
  2534. @return a copy of the octet aligned data.
  2535. </member>
  2536. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBitString.IntValue">
  2537. @return the value of the bit string as an int (truncating if necessary)
  2538. </member>
  2539. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBmpString">
  2540. Der BMPString object.
  2541. </member>
  2542. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBmpString.GetInstance(System.Object)">
  2543. return a BMP string from the given object.
  2544. @param obj the object we want converted.
  2545. @exception ArgumentException if the object cannot be converted.
  2546. </member>
  2547. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBmpString.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2548. return a BMP string from a tagged object.
  2549. @param taggedObject the tagged object holding the object we want
  2550. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2551. @exception ArgumentException if the tagged object cannot be converted.
  2552. </member>
  2553. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBmpString.#ctor(System.String)">
  2554. basic constructor
  2555. </member>
  2556. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBoolean.GetInstance(System.Object)">
  2557. return a bool from the passed in object.
  2558. @exception ArgumentException if the object cannot be converted.
  2559. </member>
  2560. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerBoolean.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2561. return a Boolean from a tagged object.
  2562. @param taggedObject the tagged object holding the object we want
  2563. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2564. @exception ArgumentException if the tagged object cannot be converted.
  2565. </member>
  2566. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerEnumerated.GetInstance(System.Object)">
  2567. return an integer from the passed in object
  2568. @exception ArgumentException if the object cannot be converted.
  2569. </member>
  2570. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerEnumerated.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2571. return an Enumerated from a tagged object.
  2572. @param taggedObject the tagged object holding the object we want
  2573. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2574. @exception ArgumentException if the tagged object cannot be converted.
  2575. </member>
  2576. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerExternal">
  2577. Class representing the DER-type External
  2578. </member>
  2579. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerExternal.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1ObjectDescriptor,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerTaggedObject)">
  2580. Creates a new instance of DerExternal
  2581. See X.690 for more informations about the meaning of these parameters
  2582. @param directReference The direct reference or <code>null</code> if not set.
  2583. @param indirectReference The indirect reference or <code>null</code> if not set.
  2584. @param dataValueDescriptor The data value descriptor or <code>null</code> if not set.
  2585. @param externalData The external data in its encoded form.
  2586. </member>
  2587. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerExternal.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1ObjectDescriptor,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Object)">
  2588. Creates a new instance of DerExternal.
  2589. See X.690 for more informations about the meaning of these parameters
  2590. @param directReference The direct reference or <code>null</code> if not set.
  2591. @param indirectReference The indirect reference or <code>null</code> if not set.
  2592. @param dataValueDescriptor The data value descriptor or <code>null</code> if not set.
  2593. @param encoding The encoding to be used for the external data
  2594. @param externalData The external data
  2595. </member>
  2596. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerExternal.Encoding">
  2597. The encoding of the content. Valid values are
  2598. <ul>
  2599. <li><code>0</code> single-ASN1-type</li>
  2600. <li><code>1</code> OCTET STRING</li>
  2601. <li><code>2</code> BIT STRING</li>
  2602. </ul>
  2603. </member>
  2604. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerGraphicString.GetInstance(System.Object)">
  2605. return a Graphic String from the passed in object
  2606. @param obj a DerGraphicString or an object that can be converted into one.
  2607. @exception IllegalArgumentException if the object cannot be converted.
  2608. @return a DerGraphicString instance, or null.
  2609. </member>
  2610. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerGraphicString.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2611. return a Graphic String from a tagged object.
  2612. @param taggedObject the tagged object holding the object we want
  2613. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2614. @exception IllegalArgumentException if the tagged object cannot be converted.
  2615. @return a DerGraphicString instance, or null.
  2616. </member>
  2617. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerIA5String">
  2618. IA5String object - this is an Ascii string.
  2619. </member>
  2620. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerIA5String.GetInstance(System.Object)">
  2621. return an IA5 string from the passed in object
  2622. @exception ArgumentException if the object cannot be converted.
  2623. </member>
  2624. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerIA5String.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2625. return an IA5 string from a tagged object.
  2626. @param taggedObject the tagged object holding the object we want
  2627. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2628. @exception ArgumentException if the tagged object cannot be converted.
  2629. </member>
  2630. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerIA5String.#ctor(System.String,System.Boolean)">
  2631. Constructor with optional validation.
  2632. @param string the base string to wrap.
  2633. @param validate whether or not to check the string.
  2634. @throws ArgumentException if validate is true and the string
  2635. contains characters that should not be in an IA5String.
  2636. </member>
  2637. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerIA5String.IsIA5String(System.String)">
  2638. return true if the passed in String can be represented without
  2639. loss as an IA5String, false otherwise.
  2640. @return true if in printable set, false otherwise.
  2641. </member>
  2642. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerInteger.GetInstance(System.Object)">
  2643. return an integer from the passed in object
  2644. @exception ArgumentException if the object cannot be converted.
  2645. </member>
  2646. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerInteger.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2647. return an Integer from a tagged object.
  2648. @param taggedObject the tagged object holding the object we want
  2649. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2650. @exception ArgumentException if the tagged object cannot be converted.
  2651. </member>
  2652. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerInteger.PositiveValue">
  2653. in some cases positive values Get crammed into a space,
  2654. that's not quite big enough...
  2655. </member>
  2656. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerInteger.IsMalformed(System.Byte[])">
  2657. Apply the correct validation for an INTEGER primitive following the BER rules.
  2658. @param bytes The raw encoding of the integer.
  2659. @return true if the (in)put fails this validation.
  2660. </member>
  2661. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerNull">
  2662. A Null object.
  2663. </member>
  2664. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerNumericString">
  2665. Der NumericString object - this is an ascii string of characters {0,1,2,3,4,5,6,7,8,9, }.
  2666. </member>
  2667. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerNumericString.GetInstance(System.Object)">
  2668. return a numeric string from the passed in object
  2669. @exception ArgumentException if the object cannot be converted.
  2670. </member>
  2671. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerNumericString.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2672. return a numeric string from a tagged object.
  2673. @param taggedObject the tagged object holding the object we want
  2674. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2675. @exception ArgumentException if the tagged object cannot be converted.
  2676. </member>
  2677. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerNumericString.#ctor(System.String,System.Boolean)">
  2678. Constructor with optional validation.
  2679. @param string the base string to wrap.
  2680. @param validate whether or not to check the string.
  2681. @throws ArgumentException if validate is true and the string
  2682. contains characters that should not be in a NumericString.
  2683. </member>
  2684. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerNumericString.IsNumericString(System.String)">
  2685. Return true if the string can be represented as a NumericString ('0'..'9', ' ')
  2686. @param str string to validate.
  2687. @return true if numeric, fale otherwise.
  2688. </member>
  2689. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier.GetInstance(System.Object)">
  2690. return an OID from the passed in object
  2691. @exception ArgumentException if the object cannot be converted.
  2692. </member>
  2693. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier.On(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  2694. Return true if this oid is an extension of the passed in branch, stem.
  2695. @param stem the arc or branch that is a possible parent.
  2696. @return true if the branch is on the passed in stem, false otherwise.
  2697. </member>
  2698. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerOctetString.#ctor(System.Byte[])">
  2699. <param name="contents">The octets making up the octet string.</param>
  2700. </member>
  2701. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerPrintableString">
  2702. Der PrintableString object.
  2703. </member>
  2704. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerPrintableString.GetInstance(System.Object)">
  2705. return a printable string from the passed in object.
  2706. @exception ArgumentException if the object cannot be converted.
  2707. </member>
  2708. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerPrintableString.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2709. return a printable string from a tagged object.
  2710. @param taggedObject the tagged object holding the object we want
  2711. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2712. @exception ArgumentException if the tagged object cannot be converted.
  2713. </member>
  2714. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerPrintableString.#ctor(System.String,System.Boolean)">
  2715. Constructor with optional validation.
  2716. @param string the base string to wrap.
  2717. @param validate whether or not to check the string.
  2718. @throws ArgumentException if validate is true and the string
  2719. contains characters that should not be in a PrintableString.
  2720. </member>
  2721. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerPrintableString.IsPrintableString(System.String)">
  2722. return true if the passed in String can be represented without
  2723. loss as a PrintableString, false otherwise.
  2724. @return true if in printable set, false otherwise.
  2725. </member>
  2726. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerSequence.#ctor">
  2727. create an empty sequence
  2728. </member>
  2729. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerSequence.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  2730. create a sequence containing one object
  2731. </member>
  2732. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerSequence.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  2733. create a sequence containing two objects
  2734. </member>
  2735. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerSequence.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  2736. create a sequence containing a vector of objects.
  2737. </member>
  2738. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerSet">
  2739. A Der encoded set object
  2740. </member>
  2741. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerSet.#ctor">
  2742. create an empty set
  2743. </member>
  2744. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerSet.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  2745. @param obj - a single object that makes up the set.
  2746. </member>
  2747. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerSet.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  2748. @param v - a vector of objects making up the set.
  2749. </member>
  2750. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerT61String">
  2751. Der T61String (also the teletex string) - 8-bit characters
  2752. </member>
  2753. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerT61String.GetInstance(System.Object)">
  2754. return a T61 string from the passed in object.
  2755. @exception ArgumentException if the object cannot be converted.
  2756. </member>
  2757. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerT61String.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2758. return a T61 string from a tagged object.
  2759. @param taggedObject the tagged object holding the object we want
  2760. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2761. @exception ArgumentException if the tagged object cannot be converted.
  2762. </member>
  2763. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerTaggedObject">
  2764. DER TaggedObject - in ASN.1 notation this is any object preceded by
  2765. a [n] where n is some number - these are assumed to follow the construction
  2766. rules (as with sequences).
  2767. </member>
  2768. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerTaggedObject.#ctor(System.Boolean,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  2769. @param isExplicit true if an explicitly tagged object.
  2770. @param tagNo the tag number for this object.
  2771. @param obj the tagged object.
  2772. </member>
  2773. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerUniversalString">
  2774. UniversalString object.
  2775. </member>
  2776. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerUniversalString.GetInstance(System.Object)">
  2777. return a universal string from the passed in object.
  2778. @exception ArgumentException if the object cannot be converted.
  2779. </member>
  2780. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerUniversalString.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2781. return a universal string from a tagged object.
  2782. @param taggedObject the tagged object holding the object we want
  2783. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2784. @exception ArgumentException if the tagged object cannot be converted.
  2785. </member>
  2786. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerUtf8String">
  2787. Der UTF8String object.
  2788. </member>
  2789. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerUtf8String.GetInstance(System.Object)">
  2790. return an UTF8 string from the passed in object.
  2791. @exception ArgumentException if the object cannot be converted.
  2792. </member>
  2793. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerUtf8String.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2794. return a UTF8 string from a tagged object.
  2795. @param taggedObject the tagged object holding the object we want
  2796. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2797. @exception ArgumentException if the tagged object cannot be converted.
  2798. </member>
  2799. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerVideotexString.GetInstance(System.Object)">
  2800. return a videotex string from the passed in object
  2801. @param obj a DERVideotexString or an object that can be converted into one.
  2802. @exception IllegalArgumentException if the object cannot be converted.
  2803. @return a DERVideotexString instance, or null.
  2804. </member>
  2805. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerVideotexString.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2806. return a videotex string from a tagged object.
  2807. @param taggedObject the tagged object holding the object we want
  2808. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2809. @exception IllegalArgumentException if the tagged object cannot be converted.
  2810. @return a DERVideotexString instance, or null.
  2811. </member>
  2812. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerVisibleString">
  2813. VisibleString object.
  2814. </member>
  2815. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerVisibleString.GetInstance(System.Object)">
  2816. return a visible string from the passed in object.
  2817. @exception ArgumentException if the object cannot be converted.
  2818. </member>
  2819. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerVisibleString.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2820. return a visible string from a tagged object.
  2821. @param taggedObject the tagged object holding the object we want
  2822. @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise.
  2823. @exception ArgumentException if the tagged object cannot be converted.
  2824. </member>
  2825. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DLBitString">
  2826. <summary>A Definite length BIT STRING</summary>
  2827. </member>
  2828. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DLBitStringParser">
  2829. <summary>Parser for a DL encoded BIT STRING.</summary>
  2830. </member>
  2831. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DLSequence.#ctor">
  2832. create an empty sequence
  2833. </member>
  2834. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DLSequence.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  2835. create a sequence containing one object
  2836. </member>
  2837. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DLSequence.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  2838. create a sequence containing two objects
  2839. </member>
  2840. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DLSequence.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  2841. create a sequence containing a vector of objects.
  2842. </member>
  2843. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DLSet.#ctor">
  2844. create an empty set
  2845. </member>
  2846. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DLSet.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  2847. create a set containing one object
  2848. </member>
  2849. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DLSet.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  2850. create a set containing a vector of objects.
  2851. </member>
  2852. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DLTaggedObjectParser">
  2853. Parser for definite-length tagged objects.
  2854. </member>
  2855. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.EdEC.EdECObjectIdentifiers">
  2856. Edwards Elliptic Curve Object Identifiers (RFC 8410)
  2857. </member>
  2858. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CertificateValues">
  2859. <remarks>
  2860. RFC 3126: 4.3.1 Certificate Values Attribute Definition
  2861. <code>
  2862. CertificateValues ::= SEQUENCE OF Certificate
  2863. </code>
  2864. </remarks>
  2865. </member>
  2866. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CommitmentTypeIndication.ToAsn1Object">
  2867. <pre>
  2868. CommitmentTypeIndication ::= SEQUENCE {
  2869. commitmentTypeId CommitmentTypeIdentifier,
  2870. commitmentTypeQualifier SEQUENCE SIZE (1..MAX) OF
  2871. CommitmentTypeQualifier OPTIONAL }
  2872. </pre>
  2873. </member>
  2874. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CommitmentTypeQualifier">
  2875. Commitment type qualifiers, used in the Commitment-Type-Indication attribute (RFC3126).
  2876. <pre>
  2877. CommitmentTypeQualifier ::= SEQUENCE {
  2878. commitmentTypeIdentifier CommitmentTypeIdentifier,
  2879. qualifier ANY DEFINED BY commitmentTypeIdentifier OPTIONAL }
  2880. </pre>
  2881. </member>
  2882. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CommitmentTypeQualifier.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  2883. Creates a new <code>CommitmentTypeQualifier</code> instance.
  2884. @param commitmentTypeIdentifier a <code>CommitmentTypeIdentifier</code> value
  2885. </member>
  2886. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CommitmentTypeQualifier.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  2887. Creates a new <code>CommitmentTypeQualifier</code> instance.
  2888. @param commitmentTypeIdentifier a <code>CommitmentTypeIdentifier</code> value
  2889. @param qualifier the qualifier, defined by the above field.
  2890. </member>
  2891. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CommitmentTypeQualifier.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  2892. Creates a new <code>CommitmentTypeQualifier</code> instance.
  2893. @param as <code>CommitmentTypeQualifier</code> structure
  2894. encoded as an Asn1Sequence.
  2895. </member>
  2896. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CommitmentTypeQualifier.ToAsn1Object">
  2897. Returns a DER-encodable representation of this instance.
  2898. @return a <code>Asn1Object</code> value
  2899. </member>
  2900. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CompleteCertificateRefs">
  2901. <remarks>
  2902. RFC 3126: 4.2.1 Complete Certificate Refs Attribute Definition
  2903. <code>
  2904. CompleteCertificateRefs ::= SEQUENCE OF OtherCertID
  2905. </code>
  2906. </remarks>
  2907. </member>
  2908. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CompleteRevocationRefs">
  2909. <remarks>
  2910. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2911. <code>
  2912. CompleteRevocationRefs ::= SEQUENCE OF CrlOcspRef
  2913. </code>
  2914. </remarks>
  2915. </member>
  2916. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CrlIdentifier">
  2917. <remarks>
  2918. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2919. <code>
  2920. CrlIdentifier ::= SEQUENCE
  2921. {
  2922. crlissuer Name,
  2923. crlIssuedTime UTCTime,
  2924. crlNumber INTEGER OPTIONAL
  2925. }
  2926. </code>
  2927. </remarks>
  2928. </member>
  2929. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CrlListID">
  2930. <remarks>
  2931. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2932. <code>
  2933. CRLListID ::= SEQUENCE
  2934. {
  2935. crls SEQUENCE OF CrlValidatedID
  2936. }
  2937. </code>
  2938. </remarks>
  2939. </member>
  2940. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CrlOcspRef">
  2941. <remarks>
  2942. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2943. <code>
  2944. CrlOcspRef ::= SEQUENCE {
  2945. crlids [0] CRLListID OPTIONAL,
  2946. ocspids [1] OcspListID OPTIONAL,
  2947. otherRev [2] OtherRevRefs OPTIONAL
  2948. }
  2949. </code>
  2950. </remarks>
  2951. </member>
  2952. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.CrlValidatedID">
  2953. <remarks>
  2954. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2955. <code>
  2956. CrlValidatedID ::= SEQUENCE {
  2957. crlHash OtherHash,
  2958. crlIdentifier CrlIdentifier OPTIONAL}
  2959. </code>
  2960. </remarks>
  2961. </member>
  2962. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.OcspIdentifier">
  2963. <remarks>
  2964. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2965. <code>
  2966. OcspIdentifier ::= SEQUENCE {
  2967. ocspResponderID ResponderID,
  2968. -- As in OCSP response data
  2969. producedAt GeneralizedTime
  2970. -- As in OCSP response data
  2971. }
  2972. </code>
  2973. </remarks>
  2974. </member>
  2975. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.OcspListID">
  2976. <remarks>
  2977. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2978. <code>
  2979. OcspListID ::= SEQUENCE {
  2980. ocspResponses SEQUENCE OF OcspResponsesID
  2981. }
  2982. </code>
  2983. </remarks>
  2984. </member>
  2985. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.OcspResponsesID">
  2986. <remarks>
  2987. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2988. <code>
  2989. OcspResponsesID ::= SEQUENCE {
  2990. ocspIdentifier OcspIdentifier,
  2991. ocspRepHash OtherHash OPTIONAL
  2992. }
  2993. </code>
  2994. </remarks>
  2995. </member>
  2996. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.OtherCertID">
  2997. <remarks>
  2998. <code>
  2999. OtherCertID ::= SEQUENCE {
  3000. otherCertHash OtherHash,
  3001. issuerSerial IssuerSerial OPTIONAL
  3002. }
  3003. </code>
  3004. </remarks>
  3005. </member>
  3006. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.OtherHash">
  3007. <remarks>
  3008. <code>
  3009. OtherHash ::= CHOICE {
  3010. sha1Hash OtherHashValue, -- This contains a SHA-1 hash
  3011. otherHash OtherHashAlgAndValue
  3012. }
  3013. OtherHashValue ::= OCTET STRING
  3014. </code>
  3015. </remarks>
  3016. </member>
  3017. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.OtherHashAlgAndValue">
  3018. <summary>
  3019. Summary description for OtherHashAlgAndValue.
  3020. </summary>
  3021. <remarks>
  3022. <code>
  3023. OtherHashAlgAndValue ::= SEQUENCE {
  3024. hashAlgorithm AlgorithmIdentifier,
  3025. hashValue OtherHashValue
  3026. }
  3027. OtherHashValue ::= OCTET STRING
  3028. </code>
  3029. </remarks>
  3030. </member>
  3031. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.OtherRevRefs">
  3032. <remarks>
  3033. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  3034. <code>
  3035. OtherRevRefs ::= SEQUENCE
  3036. {
  3037. otherRevRefType OtherRevRefType,
  3038. otherRevRefs ANY DEFINED BY otherRevRefType
  3039. }
  3040. OtherRevRefType ::= OBJECT IDENTIFIER
  3041. </code>
  3042. </remarks>
  3043. </member>
  3044. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.OtherRevVals">
  3045. <remarks>
  3046. RFC 3126: 4.3.2 Revocation Values Attribute Definition
  3047. <code>
  3048. OtherRevVals ::= SEQUENCE
  3049. {
  3050. otherRevValType OtherRevValType,
  3051. otherRevVals ANY DEFINED BY otherRevValType
  3052. }
  3053. OtherRevValType ::= OBJECT IDENTIFIER
  3054. </code>
  3055. </remarks>
  3056. </member>
  3057. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.OtherSigningCertificate">
  3058. <remarks>
  3059. <code>
  3060. OtherSigningCertificate ::= SEQUENCE {
  3061. certs SEQUENCE OF OtherCertID,
  3062. policies SEQUENCE OF PolicyInformation OPTIONAL
  3063. }
  3064. </code>
  3065. </remarks>
  3066. </member>
  3067. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.RevocationValues">
  3068. <remarks>
  3069. RFC 5126: 6.3.4. revocation-values Attribute Definition
  3070. <code>
  3071. RevocationValues ::= SEQUENCE {
  3072. crlVals [0] SEQUENCE OF CertificateList OPTIONAL,
  3073. ocspVals [1] SEQUENCE OF BasicOCSPResponse OPTIONAL,
  3074. otherRevVals [2] OtherRevVals OPTIONAL
  3075. }
  3076. </code>
  3077. </remarks>
  3078. </member>
  3079. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.SignaturePolicyId">
  3080. <remarks>
  3081. <code>
  3082. SignaturePolicyId ::= SEQUENCE {
  3083. sigPolicyIdentifier SigPolicyId,
  3084. sigPolicyHash SigPolicyHash,
  3085. sigPolicyQualifiers SEQUENCE SIZE (1..MAX) OF SigPolicyQualifierInfo OPTIONAL
  3086. }
  3087. SigPolicyId ::= OBJECT IDENTIFIER
  3088. SigPolicyHash ::= OtherHashAlgAndValue
  3089. </code>
  3090. </remarks>
  3091. </member>
  3092. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.SignaturePolicyIdentifier">
  3093. <remarks>
  3094. <code>
  3095. SignaturePolicyIdentifier ::= CHOICE {
  3096. SignaturePolicyId SignaturePolicyId,
  3097. SignaturePolicyImplied SignaturePolicyImplied
  3098. }
  3099. SignaturePolicyImplied ::= NULL
  3100. </code>
  3101. </remarks>
  3102. </member>
  3103. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.SignerAttribute.ToAsn1Object">
  3104. <pre>
  3105. SignerAttribute ::= SEQUENCE OF CHOICE {
  3106. claimedAttributes [0] ClaimedAttributes,
  3107. certifiedAttributes [1] CertifiedAttributes }
  3108. ClaimedAttributes ::= SEQUENCE OF Attribute
  3109. CertifiedAttributes ::= AttributeCertificate -- as defined in RFC 3281: see clause 4.1.
  3110. </pre>
  3111. </member>
  3112. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.SignerLocation">
  3113. Signer-Location attribute (RFC3126).
  3114. <pre>
  3115. SignerLocation ::= SEQUENCE {
  3116. countryName [0] DirectoryString OPTIONAL,
  3117. localityName [1] DirectoryString OPTIONAL,
  3118. postalAddress [2] PostalAddress OPTIONAL }
  3119. PostalAddress ::= SEQUENCE SIZE(1..6) OF DirectoryString
  3120. </pre>
  3121. </member>
  3122. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.SignerLocation.ToAsn1Object">
  3123. <pre>
  3124. SignerLocation ::= SEQUENCE {
  3125. countryName [0] DirectoryString OPTIONAL,
  3126. localityName [1] DirectoryString OPTIONAL,
  3127. postalAddress [2] PostalAddress OPTIONAL }
  3128. PostalAddress ::= SEQUENCE SIZE(1..6) OF DirectoryString
  3129. DirectoryString ::= CHOICE {
  3130. teletexString TeletexString (SIZE (1..MAX)),
  3131. printableString PrintableString (SIZE (1..MAX)),
  3132. universalString UniversalString (SIZE (1..MAX)),
  3133. utf8String UTF8String (SIZE (1.. MAX)),
  3134. bmpString BMPString (SIZE (1..MAX)) }
  3135. </pre>
  3136. </member>
  3137. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf.SigPolicyQualifierInfo">
  3138. <remarks>
  3139. <code>
  3140. SigPolicyQualifierInfo ::= SEQUENCE {
  3141. sigPolicyQualifierId SigPolicyQualifierId,
  3142. sigQualifier ANY DEFINED BY sigPolicyQualifierId
  3143. }
  3144. SigPolicyQualifierId ::= OBJECT IDENTIFIER
  3145. </code>
  3146. </remarks>
  3147. </member>
  3148. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess.ContentHints.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  3149. constructor
  3150. </member>
  3151. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess.ContentHints.ToAsn1Object">
  3152. <pre>
  3153. ContentHints ::= SEQUENCE {
  3154. contentDescription UTF8String (SIZE (1..MAX)) OPTIONAL,
  3155. contentType ContentType }
  3156. </pre>
  3157. </member>
  3158. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess.ContentIdentifier.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1OctetString)">
  3159. Create from OCTET STRING whose octets represent the identifier.
  3160. </member>
  3161. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess.ContentIdentifier.#ctor(System.Byte[])">
  3162. Create from byte array representing the identifier.
  3163. </member>
  3164. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess.ContentIdentifier.ToAsn1Object">
  3165. The definition of ContentIdentifier is
  3166. <pre>
  3167. ContentIdentifier ::= OCTET STRING
  3168. </pre>
  3169. id-aa-contentIdentifier OBJECT IDENTIFIER ::= { iso(1)
  3170. member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
  3171. smime(16) id-aa(2) 7 }
  3172. </member>
  3173. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess.EssCertID.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  3174. constructor
  3175. </member>
  3176. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess.EssCertID.ToAsn1Object">
  3177. <pre>
  3178. EssCertID ::= SEQUENCE {
  3179. certHash Hash,
  3180. issuerSerial IssuerSerial OPTIONAL }
  3181. </pre>
  3182. </member>
  3183. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess.EssCertIDv2.ToAsn1Object">
  3184. <pre>
  3185. EssCertIDv2 ::= SEQUENCE {
  3186. hashAlgorithm AlgorithmIdentifier
  3187. DEFAULT {algorithm id-sha256},
  3188. certHash Hash,
  3189. issuerSerial IssuerSerial OPTIONAL
  3190. }
  3191. Hash ::= OCTET STRING
  3192. IssuerSerial ::= SEQUENCE {
  3193. issuer GeneralNames,
  3194. serialNumber CertificateSerialNumber
  3195. }
  3196. </pre>
  3197. </member>
  3198. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess.SigningCertificate.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  3199. constructors
  3200. </member>
  3201. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess.SigningCertificate.ToAsn1Object">
  3202. The definition of SigningCertificate is
  3203. <pre>
  3204. SigningCertificate ::= SEQUENCE {
  3205. certs SEQUENCE OF EssCertID,
  3206. policies SEQUENCE OF PolicyInformation OPTIONAL
  3207. }
  3208. </pre>
  3209. id-aa-signingCertificate OBJECT IDENTIFIER ::= { iso(1)
  3210. member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
  3211. smime(16) id-aa(2) 12 }
  3212. </member>
  3213. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess.SigningCertificateV2.ToAsn1Object">
  3214. The definition of SigningCertificateV2 is
  3215. <pre>
  3216. SigningCertificateV2 ::= SEQUENCE {
  3217. certs SEQUENCE OF EssCertIDv2,
  3218. policies SEQUENCE OF PolicyInformation OPTIONAL
  3219. }
  3220. </pre>
  3221. id-aa-signingCertificateV2 OBJECT IDENTIFIER ::= { iso(1)
  3222. member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
  3223. smime(16) id-aa(2) 47 }
  3224. </member>
  3225. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM.GMNamedCurves">
  3226. <summary>Elliptic curve registry for GM.</summary>
  3227. </member>
  3228. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM.GMNamedCurves.GetByName(System.String)">
  3229. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given name.</summary>
  3230. <param name="name">The name of the curve.</param>
  3231. </member>
  3232. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM.GMNamedCurves.GetByNameLazy(System.String)">
  3233. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given name.</summary>
  3234. <remarks>
  3235. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  3236. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  3237. </remarks>
  3238. <param name="name">The name of the curve.</param>
  3239. </member>
  3240. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM.GMNamedCurves.GetByOid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  3241. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given
  3242. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  3243. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  3244. </member>
  3245. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM.GMNamedCurves.GetByOidLazy(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  3246. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given
  3247. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  3248. <remarks>
  3249. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  3250. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  3251. </remarks>
  3252. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  3253. </member>
  3254. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM.GMNamedCurves.GetName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  3255. <summary>Look up the name of the curve with the given <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  3256. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  3257. </member>
  3258. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM.GMNamedCurves.GetOid(System.String)">
  3259. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> of the curve with the given name.</summary>
  3260. <param name="name">The name of the curve.</param>
  3261. </member>
  3262. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM.GMNamedCurves.Names">
  3263. <summary>Enumerate the available curve names in this registry.</summary>
  3264. </member>
  3265. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Gnu.GnuObjectIdentifiers.EllipticCurve">
  3266. 1.3.6.1.4.1.11591.15 - ellipticCurve
  3267. </member>
  3268. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IAsn1Choice">
  3269. Marker interface for CHOICE objects - if you implement this in a roll-your-own
  3270. object, any attempt to tag the object implicitly will convert the tag to an
  3271. explicit one as the encoding rules require.
  3272. <p>
  3273. If you use this interface your class should also implement the getInstance
  3274. pattern which takes a tag object and the tagging mode used.
  3275. </p>
  3276. </member>
  3277. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IAsn1String">
  3278. basic interface for Der string objects.
  3279. </member>
  3280. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Icao.CscaMasterList">
  3281. The CscaMasterList object. This object can be wrapped in a
  3282. CMSSignedData to be published in LDAP.
  3283. <pre>
  3284. CscaMasterList ::= SEQUENCE {
  3285. version CscaMasterListVersion,
  3286. certList SET OF Certificate }
  3287. CscaMasterListVersion :: INTEGER {v0(0)}
  3288. </pre>
  3289. </member>
  3290. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Icao.DataGroupHash">
  3291. The DataGroupHash object.
  3292. <pre>
  3293. DataGroupHash ::= SEQUENCE {
  3294. dataGroupNumber DataGroupNumber,
  3295. dataGroupHashValue OCTET STRING }
  3296. DataGroupNumber ::= INTEGER {
  3297. dataGroup1 (1),
  3298. dataGroup1 (2),
  3299. dataGroup1 (3),
  3300. dataGroup1 (4),
  3301. dataGroup1 (5),
  3302. dataGroup1 (6),
  3303. dataGroup1 (7),
  3304. dataGroup1 (8),
  3305. dataGroup1 (9),
  3306. dataGroup1 (10),
  3307. dataGroup1 (11),
  3308. dataGroup1 (12),
  3309. dataGroup1 (13),
  3310. dataGroup1 (14),
  3311. dataGroup1 (15),
  3312. dataGroup1 (16) }
  3313. </pre>
  3314. </member>
  3315. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Icao.LdsSecurityObject">
  3316. The LDSSecurityObject object (V1.8).
  3317. <pre>
  3318. LDSSecurityObject ::= SEQUENCE {
  3319. version LDSSecurityObjectVersion,
  3320. hashAlgorithm DigestAlgorithmIdentifier,
  3321. dataGroupHashValues SEQUENCE SIZE (2..ub-DataGroups) OF DataHashGroup,
  3322. ldsVersionInfo LDSVersionInfo OPTIONAL
  3323. -- if present, version MUST be v1 }
  3324. DigestAlgorithmIdentifier ::= AlgorithmIdentifier,
  3325. LDSSecurityObjectVersion :: INTEGER {V0(0)}
  3326. </pre>
  3327. </member>
  3328. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Icao.LdsVersionInfo.ToAsn1Object">
  3329. <pre>
  3330. LDSVersionInfo ::= SEQUENCE {
  3331. ldsVersion PRINTABLE STRING
  3332. unicodeVersion PRINTABLE STRING
  3333. }
  3334. </pre>
  3335. @return
  3336. </member>
  3337. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttCPAccredited">
  3338. The id-isismtt-cp-accredited OID indicates that the certificate is a
  3339. qualified certificate according to Directive 1999/93/EC of the European
  3340. Parliament and of the Council of 13 December 1999 on a Community
  3341. Framework for Electronic Signatures, which additionally conforms the
  3342. special requirements of the SigG and has been issued by an accredited CA.
  3343. </member>
  3344. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATDateOfCertGen">
  3345. Certificate extensionDate of certificate generation
  3346. <pre>
  3347. DateOfCertGenSyntax ::= GeneralizedTime
  3348. </pre>
  3349. </member>
  3350. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATProcuration">
  3351. Attribute to indicate that the certificate holder may sign in the name of
  3352. a third person. May also be used as extension in a certificate.
  3353. </member>
  3354. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATAdmission">
  3355. Attribute to indicate admissions to certain professions. May be used as
  3356. attribute in attribute certificate or as extension in a certificate
  3357. </member>
  3358. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATMonetaryLimit">
  3359. Monetary limit for transactions. The QcEuMonetaryLimit QC statement MUST
  3360. be used in new certificates in place of the extension/attribute
  3361. MonetaryLimit since January 1, 2004. For the sake of backward
  3362. compatibility with certificates already in use, SigG conforming
  3363. components MUST support MonetaryLimit (as well as QcEuLimitValue).
  3364. </member>
  3365. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATDeclarationOfMajority">
  3366. A declaration of majority. May be used as attribute in attribute
  3367. certificate or as extension in a certificate
  3368. </member>
  3369. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATIccsn">
  3370. Serial number of the smart card containing the corresponding private key
  3371. <pre>
  3372. ICCSNSyntax ::= OCTET STRING (SIZE(8..20))
  3373. </pre>
  3374. </member>
  3375. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATPKReference">
  3376. Reference for a file of a smartcard that stores the public key of this
  3377. certificate and that is used as �security anchor�.
  3378. <pre>
  3379. PKReferenceSyntax ::= OCTET STRING (SIZE(20))
  3380. </pre>
  3381. </member>
  3382. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATRestriction">
  3383. Some other restriction regarding the usage of this certificate. May be
  3384. used as attribute in attribute certificate or as extension in a
  3385. certificate.
  3386. <pre>
  3387. RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
  3388. </pre>
  3389. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Restriction
  3390. </member>
  3391. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATRetrieveIfAllowed">
  3392. (Single)Request extension: Clients may include this extension in a
  3393. (single) Request to request the responder to send the certificate in the
  3394. response message along with the status information. Besides the LDAP
  3395. service, this extension provides another mechanism for the distribution
  3396. of certificates, which MAY optionally be provided by certificate
  3397. repositories.
  3398. <pre>
  3399. RetrieveIfAllowed ::= BOOLEAN
  3400. </pre>
  3401. </member>
  3402. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATRequestedCertificate">
  3403. SingleOCSPResponse extension: The certificate requested by the client by
  3404. inserting the RetrieveIfAllowed extension in the request, will be
  3405. returned in this extension.
  3406. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp.RequestedCertificate
  3407. </member>
  3408. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATNamingAuthorities">
  3409. Base ObjectIdentifier for naming authorities
  3410. </member>
  3411. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATCertInDirSince">
  3412. SingleOCSPResponse extension: Date, when certificate has been published
  3413. in the directory and status information has become available. Currently,
  3414. accrediting authorities enforce that SigG-conforming OCSP servers include
  3415. this extension in the responses.
  3416. <pre>
  3417. CertInDirSince ::= GeneralizedTime
  3418. </pre>
  3419. </member>
  3420. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATCertHash">
  3421. Hash of a certificate in OCSP.
  3422. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp.CertHash
  3423. </member>
  3424. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATNameAtBirth">
  3425. <pre>
  3426. NameAtBirth ::= DirectoryString(SIZE(1..64)
  3427. </pre>
  3428. Used in
  3429. {@link Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes SubjectDirectoryAttributes}
  3430. </member>
  3431. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATAdditionalInformation">
  3432. Some other information of non-restrictive nature regarding the usage of
  3433. this certificate. May be used as attribute in atribute certificate or as
  3434. extension in a certificate.
  3435. <pre>
  3436. AdditionalInformationSyntax ::= DirectoryString (SIZE(1..2048))
  3437. </pre>
  3438. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdditionalInformationSyntax
  3439. </member>
  3440. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATLiabilityLimitationFlag">
  3441. Indicates that an attribute certificate exists, which limits the
  3442. usability of this public key certificate. Whenever verifying a signature
  3443. with the help of this certificate, the content of the corresponding
  3444. attribute certificate should be concerned. This extension MUST be
  3445. included in a PKC, if a corresponding attribute certificate (having the
  3446. PKC as base certificate) contains some attribute that restricts the
  3447. usability of the PKC too. Attribute certificates with restricting content
  3448. MUST always be included in the signed document.
  3449. <pre>
  3450. LiabilityLimitationFlagSyntax ::= BOOLEAN
  3451. </pre>
  3452. </member>
  3453. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp.CertHash">
  3454. ISIS-MTT PROFILE: The responder may include this extension in a response to
  3455. send the hash of the requested certificate to the responder. This hash is
  3456. cryptographically bound to the certificate and serves as evidence that the
  3457. certificate is known to the responder (i.e. it has been issued and is present
  3458. in the directory). Hence, this extension is a means to provide a positive
  3459. statement of availability as described in T8.[8]. As explained in T13.[1],
  3460. clients may rely on this information to be able to validate signatures after
  3461. the expiry of the corresponding certificate. Hence, clients MUST support this
  3462. extension. If a positive statement of availability is to be delivered, this
  3463. extension syntax and OID MUST be used.
  3464. <p/>
  3465. <p/>
  3466. <pre>
  3467. CertHash ::= SEQUENCE {
  3468. hashAlgorithm AlgorithmIdentifier,
  3469. certificateHash OCTET STRING
  3470. }
  3471. </pre>
  3472. </member>
  3473. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp.CertHash.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  3474. Constructor from Asn1Sequence.
  3475. <p/>
  3476. The sequence is of type CertHash:
  3477. <p/>
  3478. <pre>
  3479. CertHash ::= SEQUENCE {
  3480. hashAlgorithm AlgorithmIdentifier,
  3481. certificateHash OCTET STRING
  3482. }
  3483. </pre>
  3484. @param seq The ASN.1 sequence.
  3485. </member>
  3486. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp.CertHash.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier,System.Byte[])">
  3487. Constructor from a given details.
  3488. @param hashAlgorithm The hash algorithm identifier.
  3489. @param certificateHash The hash of the whole DER encoding of the certificate.
  3490. </member>
  3491. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp.CertHash.ToAsn1Object">
  3492. Produce an object suitable for an Asn1OutputStream.
  3493. <p/>
  3494. Returns:
  3495. <p/>
  3496. <pre>
  3497. CertHash ::= SEQUENCE {
  3498. hashAlgorithm AlgorithmIdentifier,
  3499. certificateHash OCTET STRING
  3500. }
  3501. </pre>
  3502. @return an Asn1Object
  3503. </member>
  3504. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp.RequestedCertificate">
  3505. ISIS-MTT-Optional: The certificate requested by the client by inserting the
  3506. RetrieveIfAllowed extension in the request, will be returned in this
  3507. extension.
  3508. <p/>
  3509. ISIS-MTT-SigG: The signature act allows publishing certificates only then,
  3510. when the certificate owner gives his isExplicit permission. Accordingly, there
  3511. may be �nondownloadable� certificates, about which the responder must provide
  3512. status information, but MUST NOT include them in the response. Clients may
  3513. get therefore the following three kind of answers on a single request
  3514. including the RetrieveIfAllowed extension:
  3515. <ul>
  3516. <li> a) the responder supports the extension and is allowed to publish the
  3517. certificate: RequestedCertificate returned including the requested
  3518. certificate</li>
  3519. <li>b) the responder supports the extension but is NOT allowed to publish
  3520. the certificate: RequestedCertificate returned including an empty OCTET
  3521. STRING</li>
  3522. <li>c) the responder does not support the extension: RequestedCertificate is
  3523. not included in the response</li>
  3524. </ul>
  3525. Clients requesting RetrieveIfAllowed MUST be able to handle these cases. If
  3526. any of the OCTET STRING options is used, it MUST contain the DER encoding of
  3527. the requested certificate.
  3528. <p/>
  3529. <pre>
  3530. RequestedCertificate ::= CHOICE {
  3531. Certificate Certificate,
  3532. publicKeyCertificate [0] EXPLICIT OCTET STRING,
  3533. attributeCertificate [1] EXPLICIT OCTET STRING
  3534. }
  3535. </pre>
  3536. </member>
  3537. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp.RequestedCertificate.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509CertificateStructure)">
  3538. Constructor from a given details.
  3539. <p/>
  3540. Only one parameter can be given. All other must be <code>null</code>.
  3541. @param certificate Given as Certificate
  3542. </member>
  3543. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp.RequestedCertificate.ToAsn1Object">
  3544. Produce an object suitable for an Asn1OutputStream.
  3545. <p/>
  3546. Returns:
  3547. <p/>
  3548. <pre>
  3549. RequestedCertificate ::= CHOICE {
  3550. Certificate Certificate,
  3551. publicKeyCertificate [0] EXPLICIT OCTET STRING,
  3552. attributeCertificate [1] EXPLICIT OCTET STRING
  3553. }
  3554. </pre>
  3555. @return an Asn1Object
  3556. </member>
  3557. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdditionalInformationSyntax">
  3558. Some other information of non-restrictive nature regarding the usage of this
  3559. certificate.
  3560. <pre>
  3561. AdditionalInformationSyntax ::= DirectoryString (SIZE(1..2048))
  3562. </pre>
  3563. </member>
  3564. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdditionalInformationSyntax.#ctor(System.String)">
  3565. Constructor from a given details.
  3566. @param information The describtion of the information.
  3567. </member>
  3568. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdditionalInformationSyntax.ToAsn1Object">
  3569. Produce an object suitable for an Asn1OutputStream.
  3570. <p/>
  3571. Returns:
  3572. <p/>
  3573. <pre>
  3574. AdditionalInformationSyntax ::= DirectoryString (SIZE(1..2048))
  3575. </pre>
  3576. @return an Asn1Object
  3577. </member>
  3578. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Admissions">
  3579. An Admissions structure.
  3580. <p/>
  3581. <pre>
  3582. Admissions ::= SEQUENCE
  3583. {
  3584. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3585. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3586. professionInfos SEQUENCE OF ProfessionInfo
  3587. }
  3588. <p/>
  3589. </pre>
  3590. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax
  3591. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo
  3592. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority
  3593. </member>
  3594. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Admissions.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  3595. Constructor from Asn1Sequence.
  3596. <p/>
  3597. The sequence is of type ProcurationSyntax:
  3598. <p/>
  3599. <pre>
  3600. Admissions ::= SEQUENCE
  3601. {
  3602. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3603. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3604. professionInfos SEQUENCE OF ProfessionInfo
  3605. }
  3606. </pre>
  3607. @param seq The ASN.1 sequence.
  3608. </member>
  3609. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Admissions.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo[])">
  3610. Constructor from a given details.
  3611. <p/>
  3612. Parameter <code>professionInfos</code> is mandatory.
  3613. @param admissionAuthority The admission authority.
  3614. @param namingAuthority The naming authority.
  3615. @param professionInfos The profession infos.
  3616. </member>
  3617. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Admissions.ToAsn1Object">
  3618. Produce an object suitable for an Asn1OutputStream.
  3619. <p/>
  3620. Returns:
  3621. <p/>
  3622. <pre>
  3623. Admissions ::= SEQUENCE
  3624. {
  3625. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3626. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3627. professionInfos SEQUENCE OF ProfessionInfo
  3628. }
  3629. <p/>
  3630. </pre>
  3631. @return an Asn1Object
  3632. </member>
  3633. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax">
  3634. Attribute to indicate admissions to certain professions.
  3635. <p/>
  3636. <pre>
  3637. AdmissionSyntax ::= SEQUENCE
  3638. {
  3639. admissionAuthority GeneralName OPTIONAL,
  3640. contentsOfAdmissions SEQUENCE OF Admissions
  3641. }
  3642. <p/>
  3643. Admissions ::= SEQUENCE
  3644. {
  3645. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3646. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3647. professionInfos SEQUENCE OF ProfessionInfo
  3648. }
  3649. <p/>
  3650. NamingAuthority ::= SEQUENCE
  3651. {
  3652. namingAuthorityId OBJECT IDENTIFIER OPTIONAL,
  3653. namingAuthorityUrl IA5String OPTIONAL,
  3654. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3655. }
  3656. <p/>
  3657. ProfessionInfo ::= SEQUENCE
  3658. {
  3659. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  3660. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  3661. professionOIDs SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  3662. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  3663. addProfessionInfo OCTET STRING OPTIONAL
  3664. }
  3665. </pre>
  3666. <p/>
  3667. <p/>
  3668. ISIS-MTT PROFILE: The relatively complex structure of AdmissionSyntax
  3669. supports the following concepts and requirements:
  3670. <ul>
  3671. <li> External institutions (e.g. professional associations, chambers, unions,
  3672. administrative bodies, companies, etc.), which are responsible for granting
  3673. and verifying professional admissions, are indicated by means of the data
  3674. field admissionAuthority. An admission authority is indicated by a
  3675. GeneralName object. Here an X.501 directory name (distinguished name) can be
  3676. indicated in the field directoryName, a URL address can be indicated in the
  3677. field uniformResourceIdentifier, and an object identifier can be indicated in
  3678. the field registeredId.</li>
  3679. <li> The names of authorities which are responsible for the administration of
  3680. title registers are indicated in the data field namingAuthority. The name of
  3681. the authority can be identified by an object identifier in the field
  3682. namingAuthorityId, by means of a text string in the field
  3683. namingAuthorityText, by means of a URL address in the field
  3684. namingAuthorityUrl, or by a combination of them. For example, the text string
  3685. can contain the name of the authority, the country and the name of the title
  3686. register. The URL-option refers to a web page which contains lists with
  3687. officially registered professions (text and possibly OID) as well as
  3688. further information on these professions. Object identifiers for the
  3689. component namingAuthorityId are grouped under the OID-branch
  3690. id-isis-at-namingAuthorities and must be applied for.</li>
  3691. <li>See http://www.teletrust.de/anwend.asp?Id=30200&amp;Sprache=E_&amp;HomePG=0
  3692. for an application form and http://www.teletrust.de/links.asp?id=30220,11
  3693. for an overview of registered naming authorities.</li>
  3694. <li> By means of the data type ProfessionInfo certain professions,
  3695. specializations, disciplines, fields of activity, etc. are identified. A
  3696. profession is represented by one or more text strings, resp. profession OIDs
  3697. in the fields professionItems and professionOIDs and by a registration number
  3698. in the field registrationNumber. An indication in text form must always be
  3699. present, whereas the other indications are optional. The component
  3700. addProfessionInfo may contain additional applicationspecific information in
  3701. DER-encoded form.</li>
  3702. </ul>
  3703. <p/>
  3704. By means of different namingAuthority-OIDs or profession OIDs hierarchies of
  3705. professions, specializations, disciplines, fields of activity, etc. can be
  3706. expressed. The issuing admission authority should always be indicated (field
  3707. admissionAuthority), whenever a registration number is presented. Still,
  3708. information on admissions can be given without indicating an admission or a
  3709. naming authority by the exclusive use of the component professionItems. In
  3710. this case the certification authority is responsible for the verification of
  3711. the admission information.
  3712. <p/>
  3713. <p/>
  3714. <p/>
  3715. This attribute is single-valued. Still, several admissions can be captured in
  3716. the sequence structure of the component contentsOfAdmissions of
  3717. AdmissionSyntax or in the component professionInfos of Admissions. The
  3718. component admissionAuthority of AdmissionSyntax serves as default value for
  3719. the component admissionAuthority of Admissions. Within the latter component
  3720. the default value can be overwritten, in case that another authority is
  3721. responsible. The component namingAuthority of Admissions serves as a default
  3722. value for the component namingAuthority of ProfessionInfo. Within the latter
  3723. component the default value can be overwritten, in case that another naming
  3724. authority needs to be recorded.
  3725. <p/>
  3726. The length of the string objects is limited to 128 characters. It is
  3727. recommended to indicate a namingAuthorityURL in all issued attribute
  3728. certificates. If a namingAuthorityURL is indicated, the field professionItems
  3729. of ProfessionInfo should contain only registered titles. If the field
  3730. professionOIDs exists, it has to contain the OIDs of the professions listed
  3731. in professionItems in the same order. In general, the field professionInfos
  3732. should contain only one entry, unless the admissions that are to be listed
  3733. are logically connected (e.g. they have been issued under the same admission
  3734. number).
  3735. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Admissions
  3736. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo
  3737. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority
  3738. </member>
  3739. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  3740. Constructor from Asn1Sequence.
  3741. <p/>
  3742. The sequence is of type ProcurationSyntax:
  3743. <p/>
  3744. <pre>
  3745. AdmissionSyntax ::= SEQUENCE
  3746. {
  3747. admissionAuthority GeneralName OPTIONAL,
  3748. contentsOfAdmissions SEQUENCE OF Admissions
  3749. }
  3750. <p/>
  3751. Admissions ::= SEQUENCE
  3752. {
  3753. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3754. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3755. professionInfos SEQUENCE OF ProfessionInfo
  3756. }
  3757. <p/>
  3758. NamingAuthority ::= SEQUENCE
  3759. {
  3760. namingAuthorityId OBJECT IDENTIFIER OPTIONAL,
  3761. namingAuthorityUrl IA5String OPTIONAL,
  3762. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3763. }
  3764. <p/>
  3765. ProfessionInfo ::= SEQUENCE
  3766. {
  3767. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  3768. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  3769. professionOIDs SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  3770. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  3771. addProfessionInfo OCTET STRING OPTIONAL
  3772. }
  3773. </pre>
  3774. @param seq The ASN.1 sequence.
  3775. </member>
  3776. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  3777. Constructor from given details.
  3778. @param admissionAuthority The admission authority.
  3779. @param contentsOfAdmissions The admissions.
  3780. </member>
  3781. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax.ToAsn1Object">
  3782. Produce an object suitable for an Asn1OutputStream.
  3783. <p/>
  3784. Returns:
  3785. <p/>
  3786. <pre>
  3787. AdmissionSyntax ::= SEQUENCE
  3788. {
  3789. admissionAuthority GeneralName OPTIONAL,
  3790. contentsOfAdmissions SEQUENCE OF Admissions
  3791. }
  3792. <p/>
  3793. Admissions ::= SEQUENCE
  3794. {
  3795. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3796. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3797. professionInfos SEQUENCE OF ProfessionInfo
  3798. }
  3799. <p/>
  3800. NamingAuthority ::= SEQUENCE
  3801. {
  3802. namingAuthorityId OBJECT IDENTIFIER OPTIONAL,
  3803. namingAuthorityUrl IA5String OPTIONAL,
  3804. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3805. }
  3806. <p/>
  3807. ProfessionInfo ::= SEQUENCE
  3808. {
  3809. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  3810. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  3811. professionOIDs SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  3812. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  3813. addProfessionInfo OCTET STRING OPTIONAL
  3814. }
  3815. </pre>
  3816. @return an Asn1Object
  3817. </member>
  3818. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax.AdmissionAuthority">
  3819. @return Returns the admissionAuthority if present, null otherwise.
  3820. </member>
  3821. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax.GetContentsOfAdmissions">
  3822. @return Returns the contentsOfAdmissions.
  3823. </member>
  3824. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.DeclarationOfMajority">
  3825. A declaration of majority.
  3826. <p/>
  3827. <pre>
  3828. DeclarationOfMajoritySyntax ::= CHOICE
  3829. {
  3830. notYoungerThan [0] IMPLICIT INTEGER,
  3831. fullAgeAtCountry [1] IMPLICIT SEQUENCE
  3832. {
  3833. fullAge BOOLEAN DEFAULT TRUE,
  3834. country PrintableString (SIZE(2))
  3835. }
  3836. dateOfBirth [2] IMPLICIT GeneralizedTime
  3837. }
  3838. </pre>
  3839. <p/>
  3840. fullAgeAtCountry indicates the majority of the owner with respect to the laws
  3841. of a specific country.
  3842. </member>
  3843. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.DeclarationOfMajority.ToAsn1Object">
  3844. Produce an object suitable for an Asn1OutputStream.
  3845. <p/>
  3846. Returns:
  3847. <p/>
  3848. <pre>
  3849. DeclarationOfMajoritySyntax ::= CHOICE
  3850. {
  3851. notYoungerThan [0] IMPLICIT INTEGER,
  3852. fullAgeAtCountry [1] IMPLICIT SEQUENCE
  3853. {
  3854. fullAge BOOLEAN DEFAULT TRUE,
  3855. country PrintableString (SIZE(2))
  3856. }
  3857. dateOfBirth [2] IMPLICIT GeneralizedTime
  3858. }
  3859. </pre>
  3860. @return an Asn1Object
  3861. </member>
  3862. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.DeclarationOfMajority.NotYoungerThan">
  3863. @return notYoungerThan if that's what we are, -1 otherwise
  3864. </member>
  3865. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.MonetaryLimit">
  3866. Monetary limit for transactions. The QcEuMonetaryLimit QC statement MUST be
  3867. used in new certificates in place of the extension/attribute MonetaryLimit
  3868. since January 1, 2004. For the sake of backward compatibility with
  3869. certificates already in use, components SHOULD support MonetaryLimit (as well
  3870. as QcEuLimitValue).
  3871. <p/>
  3872. Indicates a monetary limit within which the certificate holder is authorized
  3873. to act. (This value DOES NOT express a limit on the liability of the
  3874. certification authority).
  3875. <p/>
  3876. <pre>
  3877. MonetaryLimitSyntax ::= SEQUENCE
  3878. {
  3879. currency PrintableString (SIZE(3)),
  3880. amount INTEGER,
  3881. exponent INTEGER
  3882. }
  3883. </pre>
  3884. <p/>
  3885. currency must be the ISO code.
  3886. <p/>
  3887. value = amount�10*exponent
  3888. </member>
  3889. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.MonetaryLimit.#ctor(System.String,System.Int32,System.Int32)">
  3890. Constructor from a given details.
  3891. <p/>
  3892. <p/>
  3893. value = amount�10^exponent
  3894. @param currency The currency. Must be the ISO code.
  3895. @param amount The amount
  3896. @param exponent The exponent
  3897. </member>
  3898. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.MonetaryLimit.ToAsn1Object">
  3899. Produce an object suitable for an Asn1OutputStream.
  3900. <p/>
  3901. Returns:
  3902. <p/>
  3903. <pre>
  3904. MonetaryLimitSyntax ::= SEQUENCE
  3905. {
  3906. currency PrintableString (SIZE(3)),
  3907. amount INTEGER,
  3908. exponent INTEGER
  3909. }
  3910. </pre>
  3911. @return an Asn1Object
  3912. </member>
  3913. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority">
  3914. Names of authorities which are responsible for the administration of title
  3915. registers.
  3916. <pre>
  3917. NamingAuthority ::= SEQUENCE
  3918. {
  3919. namingAuthorityID OBJECT IDENTIFIER OPTIONAL,
  3920. namingAuthorityUrl IA5String OPTIONAL,
  3921. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3922. }
  3923. </pre>
  3924. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax
  3925. </member>
  3926. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern">
  3927. Profession OIDs should always be defined under the OID branch of the
  3928. responsible naming authority. At the time of this writing, the work group
  3929. �Recht, Wirtschaft, Steuern� (�Law, Economy, Taxes�) is registered as the
  3930. first naming authority under the OID id-isismtt-at-namingAuthorities.
  3931. </member>
  3932. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  3933. Constructor from Asn1Sequence.
  3934. <p/>
  3935. <p/>
  3936. <pre>
  3937. NamingAuthority ::= SEQUENCE
  3938. {
  3939. namingAuthorityID OBJECT IDENTIFIER OPTIONAL,
  3940. namingAuthorityUrl IA5String OPTIONAL,
  3941. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3942. }
  3943. </pre>
  3944. @param seq The ASN.1 sequence.
  3945. </member>
  3946. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.NamingAuthorityID">
  3947. @return Returns the namingAuthorityID.
  3948. </member>
  3949. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.NamingAuthorityText">
  3950. @return Returns the namingAuthorityText.
  3951. </member>
  3952. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.NamingAuthorityUrl">
  3953. @return Returns the namingAuthorityUrl.
  3954. </member>
  3955. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.DirectoryString)">
  3956. Constructor from given details.
  3957. <p/>
  3958. All parameters can be combined.
  3959. @param namingAuthorityID ObjectIdentifier for naming authority.
  3960. @param namingAuthorityUrl URL for naming authority.
  3961. @param namingAuthorityText Textual representation of naming authority.
  3962. </member>
  3963. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.ToAsn1Object">
  3964. Produce an object suitable for an Asn1OutputStream.
  3965. <p/>
  3966. Returns:
  3967. <p/>
  3968. <pre>
  3969. NamingAuthority ::= SEQUENCE
  3970. {
  3971. namingAuthorityID OBJECT IDENTIFIER OPTIONAL,
  3972. namingAuthorityUrl IA5String OPTIONAL,
  3973. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3974. }
  3975. </pre>
  3976. @return an Asn1Object
  3977. </member>
  3978. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProcurationSyntax">
  3979. Attribute to indicate that the certificate holder may sign in the name of a
  3980. third person.
  3981. <p>
  3982. ISIS-MTT PROFILE: The corresponding ProcurationSyntax contains either the
  3983. name of the person who is represented (subcomponent thirdPerson) or a
  3984. reference to his/her base certificate (in the component signingFor,
  3985. subcomponent certRef), furthermore the optional components country and
  3986. typeSubstitution to indicate the country whose laws apply, and respectively
  3987. the type of procuration (e.g. manager, procuration, custody).
  3988. </p>
  3989. <p>
  3990. ISIS-MTT PROFILE: The GeneralName MUST be of type directoryName and MAY only
  3991. contain: - RFC3039 attributes, except pseudonym (countryName, commonName,
  3992. surname, givenName, serialNumber, organizationName, organizationalUnitName,
  3993. stateOrProvincename, localityName, postalAddress) and - SubjectDirectoryName
  3994. attributes (title, dateOfBirth, placeOfBirth, gender, countryOfCitizenship,
  3995. countryOfResidence and NameAtBirth).
  3996. </p>
  3997. <pre>
  3998. ProcurationSyntax ::= SEQUENCE {
  3999. country [1] EXPLICIT PrintableString(SIZE(2)) OPTIONAL,
  4000. typeOfSubstitution [2] EXPLICIT DirectoryString (SIZE(1..128)) OPTIONAL,
  4001. signingFor [3] EXPLICIT SigningFor
  4002. }
  4003. SigningFor ::= CHOICE
  4004. {
  4005. thirdPerson GeneralName,
  4006. certRef IssuerSerial
  4007. }
  4008. </pre>
  4009. </member>
  4010. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProcurationSyntax.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  4011. Constructor from Asn1Sequence.
  4012. <p/>
  4013. The sequence is of type ProcurationSyntax:
  4014. <p/>
  4015. <pre>
  4016. ProcurationSyntax ::= SEQUENCE {
  4017. country [1] EXPLICIT PrintableString(SIZE(2)) OPTIONAL,
  4018. typeOfSubstitution [2] EXPLICIT DirectoryString (SIZE(1..128)) OPTIONAL,
  4019. signingFor [3] EXPLICIT SigningFor
  4020. }
  4021. <p/>
  4022. SigningFor ::= CHOICE
  4023. {
  4024. thirdPerson GeneralName,
  4025. certRef IssuerSerial
  4026. }
  4027. </pre>
  4028. @param seq The ASN.1 sequence.
  4029. </member>
  4030. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProcurationSyntax.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.DirectoryString,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.IssuerSerial)">
  4031. Constructor from a given details.
  4032. <p/>
  4033. <p/>
  4034. Either <code>generalName</code> or <code>certRef</code> MUST be
  4035. <code>null</code>.
  4036. @param country The country code whose laws apply.
  4037. @param typeOfSubstitution The type of procuration.
  4038. @param certRef Reference to certificate of the person who is represented.
  4039. </member>
  4040. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProcurationSyntax.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.DirectoryString,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  4041. Constructor from a given details.
  4042. <p/>
  4043. <p/>
  4044. Either <code>generalName</code> or <code>certRef</code> MUST be
  4045. <code>null</code>.
  4046. @param country The country code whose laws apply.
  4047. @param typeOfSubstitution The type of procuration.
  4048. @param thirdPerson The GeneralName of the person who is represented.
  4049. </member>
  4050. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProcurationSyntax.ToAsn1Object">
  4051. Produce an object suitable for an Asn1OutputStream.
  4052. <p/>
  4053. Returns:
  4054. <p/>
  4055. <pre>
  4056. ProcurationSyntax ::= SEQUENCE {
  4057. country [1] EXPLICIT PrintableString(SIZE(2)) OPTIONAL,
  4058. typeOfSubstitution [2] EXPLICIT DirectoryString (SIZE(1..128)) OPTIONAL,
  4059. signingFor [3] EXPLICIT SigningFor
  4060. }
  4061. <p/>
  4062. SigningFor ::= CHOICE
  4063. {
  4064. thirdPerson GeneralName,
  4065. certRef IssuerSerial
  4066. }
  4067. </pre>
  4068. @return an Asn1Object
  4069. </member>
  4070. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo">
  4071. Professions, specializations, disciplines, fields of activity, etc.
  4072. <pre>
  4073. ProfessionInfo ::= SEQUENCE
  4074. {
  4075. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  4076. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  4077. professionOids SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  4078. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  4079. addProfessionInfo OCTET STRING OPTIONAL
  4080. }
  4081. </pre>
  4082. @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax
  4083. </member>
  4084. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Rechtsanwltin">
  4085. Rechtsanw�ltin
  4086. </member>
  4087. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Rechtsanwalt">
  4088. Rechtsanwalt
  4089. </member>
  4090. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Rechtsbeistand">
  4091. Rechtsbeistand
  4092. </member>
  4093. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Steuerberaterin">
  4094. Steuerberaterin
  4095. </member>
  4096. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Steuerberater">
  4097. Steuerberater
  4098. </member>
  4099. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Steuerbevollmchtigte">
  4100. Steuerbevollm�chtigte
  4101. </member>
  4102. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Steuerbevollmchtigter">
  4103. Steuerbevollm�chtigter
  4104. </member>
  4105. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notarin">
  4106. Notarin
  4107. </member>
  4108. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notar">
  4109. Notar
  4110. </member>
  4111. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notarvertreterin">
  4112. Notarvertreterin
  4113. </member>
  4114. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notarvertreter">
  4115. Notarvertreter
  4116. </member>
  4117. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notariatsverwalterin">
  4118. Notariatsverwalterin
  4119. </member>
  4120. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notariatsverwalter">
  4121. Notariatsverwalter
  4122. </member>
  4123. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Wirtschaftsprferin">
  4124. Wirtschaftspr�ferin
  4125. </member>
  4126. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Wirtschaftsprfer">
  4127. Wirtschaftspr�fer
  4128. </member>
  4129. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.VereidigteBuchprferin">
  4130. Vereidigte Buchpr�ferin
  4131. </member>
  4132. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.VereidigterBuchprfer">
  4133. Vereidigter Buchpr�fer
  4134. </member>
  4135. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Patentanwltin">
  4136. Patentanw�ltin
  4137. </member>
  4138. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Patentanwalt">
  4139. Patentanwalt
  4140. </member>
  4141. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  4142. Constructor from Asn1Sequence.
  4143. <p/>
  4144. <p/>
  4145. <pre>
  4146. ProfessionInfo ::= SEQUENCE
  4147. {
  4148. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  4149. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  4150. professionOids SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  4151. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  4152. addProfessionInfo OCTET STRING OPTIONAL
  4153. }
  4154. </pre>
  4155. @param seq The ASN.1 sequence.
  4156. </member>
  4157. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.DirectoryString[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier[],System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1OctetString)">
  4158. Constructor from given details.
  4159. <p/>
  4160. <code>professionItems</code> is mandatory, all other parameters are
  4161. optional.
  4162. @param namingAuthority The naming authority.
  4163. @param professionItems Directory strings of the profession.
  4164. @param professionOids DERObjectIdentfier objects for the
  4165. profession.
  4166. @param registrationNumber Registration number.
  4167. @param addProfessionInfo Additional infos in encoded form.
  4168. </member>
  4169. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.ToAsn1Object">
  4170. Produce an object suitable for an Asn1OutputStream.
  4171. <p/>
  4172. Returns:
  4173. <p/>
  4174. <pre>
  4175. ProfessionInfo ::= SEQUENCE
  4176. {
  4177. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  4178. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  4179. professionOids SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  4180. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  4181. addProfessionInfo OCTET STRING OPTIONAL
  4182. }
  4183. </pre>
  4184. @return an Asn1Object
  4185. </member>
  4186. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.AddProfessionInfo">
  4187. @return Returns the addProfessionInfo.
  4188. </member>
  4189. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.NamingAuthority">
  4190. @return Returns the namingAuthority.
  4191. </member>
  4192. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.GetProfessionItems">
  4193. @return Returns the professionItems.
  4194. </member>
  4195. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.GetProfessionOids">
  4196. @return Returns the professionOids.
  4197. </member>
  4198. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.RegistrationNumber">
  4199. @return Returns the registrationNumber.
  4200. </member>
  4201. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Restriction">
  4202. Some other restriction regarding the usage of this certificate.
  4203. <p/>
  4204. <pre>
  4205. RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
  4206. </pre>
  4207. </member>
  4208. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Restriction.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.DirectoryString)">
  4209. Constructor from DirectoryString.
  4210. <p/>
  4211. The DirectoryString is of type RestrictionSyntax:
  4212. <p/>
  4213. <pre>
  4214. RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
  4215. </pre>
  4216. @param restriction A IAsn1String.
  4217. </member>
  4218. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Restriction.#ctor(System.String)">
  4219. Constructor from a given details.
  4220. @param restriction The description of the restriction.
  4221. </member>
  4222. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Restriction.ToAsn1Object">
  4223. Produce an object suitable for an Asn1OutputStream.
  4224. <p/>
  4225. Returns:
  4226. <p/>
  4227. <pre>
  4228. RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
  4229. <p/>
  4230. </pre>
  4231. @return an Asn1Object
  4232. </member>
  4233. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc.Cast5CbcParameters.ToAsn1Object">
  4234. Produce an object suitable for an Asn1OutputStream.
  4235. <pre>
  4236. cast5CBCParameters ::= Sequence {
  4237. iv OCTET STRING DEFAULT 0,
  4238. -- Initialization vector
  4239. keyLength Integer
  4240. -- Key length, in bits
  4241. }
  4242. </pre>
  4243. </member>
  4244. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc.IdeaCbcPar.ToAsn1Object">
  4245. Produce an object suitable for an Asn1OutputStream.
  4246. <pre>
  4247. IDEA-CBCPar ::= Sequence {
  4248. iv OCTET STRING OPTIONAL -- exactly 8 octets
  4249. }
  4250. </pre>
  4251. </member>
  4252. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc.NetscapeCertType">
  4253. The NetscapeCertType object.
  4254. <pre>
  4255. NetscapeCertType ::= BIT STRING {
  4256. SSLClient (0),
  4257. SSLServer (1),
  4258. S/MIME (2),
  4259. Object Signing (3),
  4260. Reserved (4),
  4261. SSL CA (5),
  4262. S/MIME CA (6),
  4263. Object Signing CA (7) }
  4264. </pre>
  4265. </member>
  4266. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc.NetscapeCertType.#ctor(System.Int32)">
  4267. Basic constructor.
  4268. @param usage - the bitwise OR of the Key Usage flags giving the
  4269. allowed uses for the key.
  4270. e.g. (X509NetscapeCertType.sslCA | X509NetscapeCertType.smimeCA)
  4271. </member>
  4272. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Mozilla.PublicKeyAndChallenge">
  4273. This is designed to parse
  4274. the PublicKeyAndChallenge created by the KEYGEN tag included by
  4275. Mozilla based browsers.
  4276. <pre>
  4277. PublicKeyAndChallenge ::= SEQUENCE {
  4278. spki SubjectPublicKeyInfo,
  4279. challenge IA5STRING
  4280. }
  4281. </pre>
  4282. </member>
  4283. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.KMacWithShake128Params">
  4284. <summary>
  4285. KMACwithSHAKE128-params ::= SEQUENCE {
  4286. kMACOutputLength INTEGER DEFAULT 256, -- Output length in bits
  4287. customizationString OCTET STRING DEFAULT ''H
  4288. }
  4289. </summary>
  4290. </member>
  4291. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.KMacWithShake256Params">
  4292. <summary>
  4293. KMACwithSHAKE256-params ::= SEQUENCE {
  4294. kMACOutputLength INTEGER DEFAULT 512, -- Output length in bits
  4295. customizationString OCTET STRING DEFAULT ''H
  4296. }
  4297. </summary>
  4298. </member>
  4299. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistNamedCurves">
  4300. <summary>Elliptic curve registry for NIST curves.</summary>
  4301. </member>
  4302. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistNamedCurves.GetByName(System.String)">
  4303. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given name.</summary>
  4304. <param name="name">The name of the curve.</param>
  4305. </member>
  4306. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistNamedCurves.GetByNameLazy(System.String)">
  4307. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given name.</summary>
  4308. <remarks>
  4309. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of
  4310. the full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  4311. </remarks>
  4312. <param name="name">The name of the curve.</param>
  4313. </member>
  4314. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistNamedCurves.GetByOid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4315. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given
  4316. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  4317. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  4318. </member>
  4319. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistNamedCurves.GetByOidLazy(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4320. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given
  4321. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  4322. <remarks>
  4323. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of
  4324. the full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  4325. </remarks>
  4326. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  4327. </member>
  4328. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistNamedCurves.GetName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4329. <summary>Look up the name of the curve with the given <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  4330. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  4331. </member>
  4332. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistNamedCurves.GetOid(System.String)">
  4333. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> of the curve with the given name.</summary>
  4334. <param name="name">The name of the curve.</param>
  4335. </member>
  4336. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistNamedCurves.Names">
  4337. <summary>Enumerate the available curve names in this registry.</summary>
  4338. </member>
  4339. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdDsaWithSha3_224">
  4340. 2.16.840.1.101.3.4.3.5
  4341. </member>
  4342. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdDsaWithSha3_256">
  4343. 2.16.840.1.101.3.4.3.6
  4344. </member>
  4345. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdDsaWithSha3_384">
  4346. 2.16.840.1.101.3.4.3.7
  4347. </member>
  4348. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdDsaWithSha3_512">
  4349. 2.16.840.1.101.3.4.3.8
  4350. </member>
  4351. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdEcdsaWithSha3_224">
  4352. 2.16.840.1.101.3.4.3.9
  4353. </member>
  4354. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdEcdsaWithSha3_256">
  4355. 2.16.840.1.101.3.4.3.10
  4356. </member>
  4357. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdEcdsaWithSha3_384">
  4358. 2.16.840.1.101.3.4.3.11
  4359. </member>
  4360. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdEcdsaWithSha3_512">
  4361. 2.16.840.1.101.3.4.3.12
  4362. </member>
  4363. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224">
  4364. 2.16.840.1.101.3.4.3.9
  4365. </member>
  4366. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256">
  4367. 2.16.840.1.101.3.4.3.10
  4368. </member>
  4369. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384">
  4370. 2.16.840.1.101.3.4.3.11
  4371. </member>
  4372. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512">
  4373. 2.16.840.1.101.3.4.3.12
  4374. </member>
  4375. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt.NttObjectIdentifiers">
  4376. <summary>From RFC 3657</summary>
  4377. </member>
  4378. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.BasicOcspResponse.ToAsn1Object">
  4379. Produce an object suitable for an Asn1OutputStream.
  4380. <pre>
  4381. BasicOcspResponse ::= Sequence {
  4382. tbsResponseData ResponseData,
  4383. signatureAlgorithm AlgorithmIdentifier,
  4384. signature BIT STRING,
  4385. certs [0] EXPLICIT Sequence OF Certificate OPTIONAL }
  4386. </pre>
  4387. </member>
  4388. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.CertID.ToAsn1Object">
  4389. Produce an object suitable for an Asn1OutputStream.
  4390. <pre>
  4391. CertID ::= Sequence {
  4392. hashAlgorithm AlgorithmIdentifier,
  4393. issuerNameHash OCTET STRING, -- Hash of Issuer's DN
  4394. issuerKeyHash OCTET STRING, -- Hash of Issuers public key
  4395. serialNumber CertificateSerialNumber }
  4396. </pre>
  4397. </member>
  4398. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.CertStatus.#ctor">
  4399. create a CertStatus object with a tag of zero.
  4400. </member>
  4401. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.CertStatus.ToAsn1Object">
  4402. Produce an object suitable for an Asn1OutputStream.
  4403. <pre>
  4404. CertStatus ::= CHOICE {
  4405. good [0] IMPLICIT Null,
  4406. revoked [1] IMPLICIT RevokedInfo,
  4407. unknown [2] IMPLICIT UnknownInfo }
  4408. </pre>
  4409. </member>
  4410. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.CrlID.ToAsn1Object">
  4411. Produce an object suitable for an Asn1OutputStream.
  4412. <pre>
  4413. CrlID ::= Sequence {
  4414. crlUrl [0] EXPLICIT IA5String OPTIONAL,
  4415. crlNum [1] EXPLICIT Integer OPTIONAL,
  4416. crlTime [2] EXPLICIT GeneralizedTime OPTIONAL }
  4417. </pre>
  4418. </member>
  4419. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.OcspRequest.ToAsn1Object">
  4420. Produce an object suitable for an Asn1OutputStream.
  4421. <pre>
  4422. OcspRequest ::= Sequence {
  4423. tbsRequest TBSRequest,
  4424. optionalSignature [0] EXPLICIT Signature OPTIONAL }
  4425. </pre>
  4426. </member>
  4427. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.OcspResponse.ToAsn1Object">
  4428. Produce an object suitable for an Asn1OutputStream.
  4429. <pre>
  4430. OcspResponse ::= Sequence {
  4431. responseStatus OcspResponseStatus,
  4432. responseBytes [0] EXPLICIT ResponseBytes OPTIONAL }
  4433. </pre>
  4434. </member>
  4435. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.OcspResponseStatus.#ctor(System.Int32)">
  4436. The OcspResponseStatus enumeration.
  4437. <pre>
  4438. OcspResponseStatus ::= Enumerated {
  4439. successful (0), --Response has valid confirmations
  4440. malformedRequest (1), --Illegal confirmation request
  4441. internalError (2), --Internal error in issuer
  4442. tryLater (3), --Try again later
  4443. --(4) is not used
  4444. sigRequired (5), --Must sign the request
  4445. unauthorized (6) --Request unauthorized
  4446. }
  4447. </pre>
  4448. </member>
  4449. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.Request.ToAsn1Object">
  4450. Produce an object suitable for an Asn1OutputStream.
  4451. <pre>
  4452. Request ::= Sequence {
  4453. reqCert CertID,
  4454. singleRequestExtensions [0] EXPLICIT Extensions OPTIONAL }
  4455. </pre>
  4456. </member>
  4457. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.ResponderID.ToAsn1Object">
  4458. Produce an object suitable for an Asn1OutputStream.
  4459. <pre>
  4460. ResponderID ::= CHOICE {
  4461. byName [1] Name,
  4462. byKey [2] KeyHash }
  4463. </pre>
  4464. </member>
  4465. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.ResponseBytes.ToAsn1Object">
  4466. Produce an object suitable for an Asn1OutputStream.
  4467. <pre>
  4468. ResponseBytes ::= Sequence {
  4469. responseType OBJECT IDENTIFIER,
  4470. response OCTET STRING }
  4471. </pre>
  4472. </member>
  4473. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.ResponseData.ToAsn1Object">
  4474. Produce an object suitable for an Asn1OutputStream.
  4475. <pre>
  4476. ResponseData ::= Sequence {
  4477. version [0] EXPLICIT Version DEFAULT v1,
  4478. responderID ResponderID,
  4479. producedAt GeneralizedTime,
  4480. responses Sequence OF SingleResponse,
  4481. responseExtensions [1] EXPLICIT Extensions OPTIONAL }
  4482. </pre>
  4483. </member>
  4484. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.RevokedInfo.ToAsn1Object">
  4485. Produce an object suitable for an Asn1OutputStream.
  4486. <pre>
  4487. RevokedInfo ::= Sequence {
  4488. revocationTime GeneralizedTime,
  4489. revocationReason [0] EXPLICIT CRLReason OPTIONAL }
  4490. </pre>
  4491. </member>
  4492. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.ServiceLocator.ToAsn1Object">
  4493. Produce an object suitable for an Asn1OutputStream.
  4494. <pre>
  4495. ServiceLocator ::= Sequence {
  4496. issuer Name,
  4497. locator AuthorityInfoAccessSyntax OPTIONAL }
  4498. </pre>
  4499. </member>
  4500. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.Signature.ToAsn1Object">
  4501. Produce an object suitable for an Asn1OutputStream.
  4502. <pre>
  4503. Signature ::= Sequence {
  4504. signatureAlgorithm AlgorithmIdentifier,
  4505. signature BIT STRING,
  4506. certs [0] EXPLICIT Sequence OF Certificate OPTIONAL}
  4507. </pre>
  4508. </member>
  4509. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.SingleResponse.ToAsn1Object">
  4510. Produce an object suitable for an Asn1OutputStream.
  4511. <pre>
  4512. SingleResponse ::= Sequence {
  4513. certID CertID,
  4514. certStatus CertStatus,
  4515. thisUpdate GeneralizedTime,
  4516. nextUpdate [0] EXPLICIT GeneralizedTime OPTIONAL,
  4517. singleExtensions [1] EXPLICIT Extensions OPTIONAL }
  4518. </pre>
  4519. </member>
  4520. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.TbsRequest.ToAsn1Object">
  4521. Produce an object suitable for an Asn1OutputStream.
  4522. <pre>
  4523. TBSRequest ::= Sequence {
  4524. version [0] EXPLICIT Version DEFAULT v1,
  4525. requestorName [1] EXPLICIT GeneralName OPTIONAL,
  4526. requestList Sequence OF Request,
  4527. requestExtensions [2] EXPLICIT Extensions OPTIONAL }
  4528. </pre>
  4529. </member>
  4530. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.OidTokenizer">
  4531. class for breaking up an Oid into it's component tokens, ala
  4532. java.util.StringTokenizer. We need this class as some of the
  4533. lightweight Java environment don't support classes like
  4534. StringTokenizer.
  4535. </member>
  4536. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.AttributePkcs.GetInstance(System.Object)">
  4537. return an Attribute object from the given object.
  4538. @param o the object we want converted.
  4539. @exception ArgumentException if the object cannot be converted.
  4540. </member>
  4541. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.AttributePkcs.ToAsn1Object">
  4542. Produce an object suitable for an Asn1OutputStream.
  4543. <pre>
  4544. Attr ::= Sequence {
  4545. attrType OBJECT IDENTIFIER,
  4546. attrValues Set OF AttributeValue
  4547. }
  4548. </pre>
  4549. </member>
  4550. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.CertificationRequest">
  4551. Pkcs10 Certfication request object.
  4552. <pre>
  4553. CertificationRequest ::= Sequence {
  4554. certificationRequestInfo CertificationRequestInfo,
  4555. signatureAlgorithm AlgorithmIdentifier{{ SignatureAlgorithms }},
  4556. signature BIT STRING
  4557. }
  4558. </pre>
  4559. </member>
  4560. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.CertificationRequestInfo">
  4561. Pkcs10 CertificationRequestInfo object.
  4562. <pre>
  4563. CertificationRequestInfo ::= Sequence {
  4564. version Integer { v1(0) } (v1,...),
  4565. subject Name,
  4566. subjectPKInfo SubjectPublicKeyInfo{{ PKInfoAlgorithms }},
  4567. attributes [0] Attributes{{ CRIAttributes }}
  4568. }
  4569. Attributes { ATTRIBUTE:IOSet } ::= Set OF Attr{{ IOSet }}
  4570. Attr { ATTRIBUTE:IOSet } ::= Sequence {
  4571. type ATTRIBUTE.&amp;id({IOSet}),
  4572. values Set SIZE(1..MAX) OF ATTRIBUTE.&amp;Type({IOSet}{\@type})
  4573. }
  4574. </pre>
  4575. </member>
  4576. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.ContentInfo.ToAsn1Object">
  4577. Produce an object suitable for an Asn1OutputStream.
  4578. <pre>
  4579. ContentInfo ::= Sequence {
  4580. contentType ContentType,
  4581. content
  4582. [0] EXPLICIT ANY DEFINED BY contentType OPTIONAL }
  4583. </pre>
  4584. </member>
  4585. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.EncryptedData">
  4586. The EncryptedData object.
  4587. <pre>
  4588. EncryptedData ::= Sequence {
  4589. version Version,
  4590. encryptedContentInfo EncryptedContentInfo
  4591. }
  4592. EncryptedContentInfo ::= Sequence {
  4593. contentType ContentType,
  4594. contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier,
  4595. encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL
  4596. }
  4597. EncryptedContent ::= OCTET STRING
  4598. </pre>
  4599. </member>
  4600. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.EncryptedPrivateKeyInfo.ToAsn1Object">
  4601. Produce an object suitable for an Asn1OutputStream.
  4602. <pre>
  4603. EncryptedPrivateKeyInfo ::= Sequence {
  4604. encryptionAlgorithm AlgorithmIdentifier {{KeyEncryptionAlgorithms}},
  4605. encryptedData EncryptedData
  4606. }
  4607. EncryptedData ::= OCTET STRING
  4608. KeyEncryptionAlgorithms ALGORITHM-IDENTIFIER ::= {
  4609. ... -- For local profiles
  4610. }
  4611. </pre>
  4612. </member>
  4613. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.MacData.ToAsn1Object">
  4614. <pre>
  4615. MacData ::= SEQUENCE {
  4616. mac DigestInfo,
  4617. macSalt OCTET STRING,
  4618. iterations INTEGER DEFAULT 1
  4619. -- Note: The default is for historic reasons and its use is deprecated. A
  4620. -- higher value, like 1024 is recommended.
  4621. </pre>
  4622. @return the basic DERObject construction.
  4623. </member>
  4624. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.Pfx">
  4625. the infamous Pfx from Pkcs12
  4626. </member>
  4627. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.Sha512_224WithRSAEncryption">
  4628. PKCS#1: 1.2.840.113549.1.1.15
  4629. </member>
  4630. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.Sha512_256WithRSAEncryption">
  4631. PKCS#1: 1.2.840.113549.1.1.16
  4632. </member>
  4633. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAlgAeadChaCha20Poly1305">
  4634. <pre>
  4635. id-alg-AEADChaCha20Poly1305 OBJECT IDENTIFIER ::=
  4636. { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
  4637. pkcs9(9) smime(16) alg(3) 18 }
  4638. AEADChaCha20Poly1305Nonce ::= OCTET STRING (SIZE(12))
  4639. </pre>
  4640. </member>
  4641. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAlgHssLmsHashsig">
  4642. id-alg-hss-lms-hashsig OBJECT IDENTIFIER ::= { iso(1)
  4643. member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
  4644. smime(16) alg(3) 17 }
  4645. </member>
  4646. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAADecryptKeyID">
  4647. PKCS#9: 1.2.840.113549.1.9.16.2.37 - <a href="https://tools.ietf.org/html/rfc4108#section-2.2.5">RFC 4108</a>
  4648. </member>
  4649. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAAImplCryptoAlgs">
  4650. PKCS#9: 1.2.840.113549.1.9.16.2.38 - <a href="https://tools.ietf.org/html/rfc4108#section-2.2.6">RFC 4108</a>
  4651. </member>
  4652. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAAAsymmDecryptKeyID">
  4653. PKCS#9: 1.2.840.113549.1.9.16.2.54 <a href="https://tools.ietf.org/html/rfc7030">RFC7030</a>
  4654. </member>
  4655. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAAImplCompressAlgs">
  4656. PKCS#9: 1.2.840.113549.1.9.16.2.43 <a href="https://tools.ietf.org/html/rfc7030">RFC7030</a>
  4657. </member>
  4658. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAACommunityIdentifiers">
  4659. PKCS#9: 1.2.840.113549.1.9.16.2.40 <a href="https://tools.ietf.org/html/rfc7030">RFC7030</a>
  4660. </member>
  4661. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo">
  4662. RFC 5958
  4663. <pre>
  4664. [IMPLICIT TAGS]
  4665. OneAsymmetricKey ::= SEQUENCE {
  4666. version Version,
  4667. privateKeyAlgorithm PrivateKeyAlgorithmIdentifier,
  4668. privateKey PrivateKey,
  4669. attributes [0] Attributes OPTIONAL,
  4670. ...,
  4671. [[2: publicKey [1] PublicKey OPTIONAL ]],
  4672. ...
  4673. }
  4674. PrivateKeyInfo ::= OneAsymmetricKey
  4675. Version ::= INTEGER { v1(0), v2(1) } (v1, ..., v2)
  4676. PrivateKeyAlgorithmIdentifier ::= AlgorithmIdentifier
  4677. { PUBLIC-KEY,
  4678. { PrivateKeyAlgorithms } }
  4679. PrivateKey ::= OCTET STRING
  4680. -- Content varies based on type of key. The
  4681. -- algorithm identifier dictates the format of
  4682. -- the key.
  4683. PublicKey ::= BIT STRING
  4684. -- Content varies based on type of key. The
  4685. -- algorithm identifier dictates the format of
  4686. -- the key.
  4687. Attributes ::= SET OF Attribute { { OneAsymmetricKeyAttributes } }
  4688. </pre>
  4689. </member>
  4690. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo.HasPublicKey">
  4691. <summary>Return true if a public key is present, false otherwise.</summary>
  4692. </member>
  4693. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo.ParsePublicKey">
  4694. <summary>For when the public key is an ASN.1 encoding.</summary>
  4695. </member>
  4696. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo.PublicKeyData">
  4697. <summary>Return the public key as a raw bit string.</summary>
  4698. </member>
  4699. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.RsaesOaepParameters.#ctor">
  4700. The default version
  4701. </member>
  4702. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.RsaesOaepParameters.ToAsn1Object">
  4703. <pre>
  4704. RSAES-OAEP-params ::= SEQUENCE {
  4705. hashAlgorithm [0] OAEP-PSSDigestAlgorithms DEFAULT sha1,
  4706. maskGenAlgorithm [1] PKCS1MGFAlgorithms DEFAULT mgf1SHA1,
  4707. pSourceAlgorithm [2] PKCS1PSourceAlgorithms DEFAULT pSpecifiedEmpty
  4708. }
  4709. OAEP-PSSDigestAlgorithms ALGORITHM-IDENTIFIER ::= {
  4710. { OID id-sha1 PARAMETERS NULL }|
  4711. { OID id-sha256 PARAMETERS NULL }|
  4712. { OID id-sha384 PARAMETERS NULL }|
  4713. { OID id-sha512 PARAMETERS NULL },
  4714. ... -- Allows for future expansion --
  4715. }
  4716. PKCS1MGFAlgorithms ALGORITHM-IDENTIFIER ::= {
  4717. { OID id-mgf1 PARAMETERS OAEP-PSSDigestAlgorithms },
  4718. ... -- Allows for future expansion --
  4719. }
  4720. PKCS1PSourceAlgorithms ALGORITHM-IDENTIFIER ::= {
  4721. { OID id-pSpecified PARAMETERS OCTET STRING },
  4722. ... -- Allows for future expansion --
  4723. }
  4724. </pre>
  4725. @return the asn1 primitive representing the parameters.
  4726. </member>
  4727. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.RsaPrivateKeyStructure.ToAsn1Object">
  4728. This outputs the key in Pkcs1v2 format.
  4729. <pre>
  4730. RsaPrivateKey ::= Sequence {
  4731. version Version,
  4732. modulus Integer, -- n
  4733. publicExponent Integer, -- e
  4734. privateExponent Integer, -- d
  4735. prime1 Integer, -- p
  4736. prime2 Integer, -- q
  4737. exponent1 Integer, -- d mod (p-1)
  4738. exponent2 Integer, -- d mod (q-1)
  4739. coefficient Integer -- (inverse of q) mod p
  4740. }
  4741. Version ::= Integer
  4742. </pre>
  4743. <p>This routine is written to output Pkcs1 version 0, private keys.</p>
  4744. </member>
  4745. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.RsassaPssParameters.#ctor">
  4746. The default version
  4747. </member>
  4748. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.RsassaPssParameters.ToAsn1Object">
  4749. <pre>
  4750. RSASSA-PSS-params ::= SEQUENCE {
  4751. hashAlgorithm [0] OAEP-PSSDigestAlgorithms DEFAULT sha1,
  4752. maskGenAlgorithm [1] PKCS1MGFAlgorithms DEFAULT mgf1SHA1,
  4753. saltLength [2] INTEGER DEFAULT 20,
  4754. trailerField [3] TrailerField DEFAULT trailerFieldBC
  4755. }
  4756. OAEP-PSSDigestAlgorithms ALGORITHM-IDENTIFIER ::= {
  4757. { OID id-sha1 PARAMETERS NULL }|
  4758. { OID id-sha256 PARAMETERS NULL }|
  4759. { OID id-sha384 PARAMETERS NULL }|
  4760. { OID id-sha512 PARAMETERS NULL },
  4761. ... -- Allows for future expansion --
  4762. }
  4763. PKCS1MGFAlgorithms ALGORITHM-IDENTIFIER ::= {
  4764. { OID id-mgf1 PARAMETERS OAEP-PSSDigestAlgorithms },
  4765. ... -- Allows for future expansion --
  4766. }
  4767. TrailerField ::= INTEGER { trailerFieldBC(1) }
  4768. </pre>
  4769. @return the asn1 primitive representing the parameters.
  4770. </member>
  4771. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.SignedData">
  4772. a Pkcs#7 signed data object.
  4773. </member>
  4774. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.SignedData.ToAsn1Object">
  4775. Produce an object suitable for an Asn1OutputStream.
  4776. <pre>
  4777. SignedData ::= Sequence {
  4778. version Version,
  4779. digestAlgorithms DigestAlgorithmIdentifiers,
  4780. contentInfo ContentInfo,
  4781. certificates
  4782. [0] IMPLICIT ExtendedCertificatesAndCertificates
  4783. OPTIONAL,
  4784. crls
  4785. [1] IMPLICIT CertificateRevocationLists OPTIONAL,
  4786. signerInfos SignerInfos }
  4787. </pre>
  4788. </member>
  4789. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.SignerInfo">
  4790. a Pkcs#7 signer info object.
  4791. </member>
  4792. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.SignerInfo.ToAsn1Object">
  4793. Produce an object suitable for an Asn1OutputStream.
  4794. <pre>
  4795. SignerInfo ::= Sequence {
  4796. version Version,
  4797. issuerAndSerialNumber IssuerAndSerialNumber,
  4798. digestAlgorithm DigestAlgorithmIdentifier,
  4799. authenticatedAttributes [0] IMPLICIT Attributes OPTIONAL,
  4800. digestEncryptionAlgorithm DigestEncryptionAlgorithmIdentifier,
  4801. encryptedDigest EncryptedDigest,
  4802. unauthenticatedAttributes [1] IMPLICIT Attributes OPTIONAL
  4803. }
  4804. EncryptedDigest ::= OCTET STRING
  4805. DigestAlgorithmIdentifier ::= AlgorithmIdentifier
  4806. DigestEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
  4807. </pre>
  4808. </member>
  4809. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec.ECPrivateKeyStructure">
  4810. the elliptic curve private key object from SEC 1
  4811. </member>
  4812. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec.ECPrivateKeyStructure.ToAsn1Object">
  4813. ECPrivateKey ::= SEQUENCE {
  4814. version INTEGER { ecPrivkeyVer1(1) } (ecPrivkeyVer1),
  4815. privateKey OCTET STRING,
  4816. parameters [0] Parameters OPTIONAL,
  4817. publicKey [1] BIT STRING OPTIONAL }
  4818. </member>
  4819. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec.SecNamedCurves">
  4820. <summary>Elliptic curve registry for the SEC standard.</summary>
  4821. </member>
  4822. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec.SecNamedCurves.GetByName(System.String)">
  4823. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given name.</summary>
  4824. <param name="name">The name of the curve.</param>
  4825. </member>
  4826. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec.SecNamedCurves.GetByNameLazy(System.String)">
  4827. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given name.</summary>
  4828. <remarks>
  4829. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  4830. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  4831. </remarks>
  4832. <param name="name">The name of the curve.</param>
  4833. </member>
  4834. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec.SecNamedCurves.GetByOid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4835. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given
  4836. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  4837. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  4838. </member>
  4839. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec.SecNamedCurves.GetByOidLazy(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4840. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given
  4841. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  4842. <remarks>
  4843. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  4844. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  4845. </remarks>
  4846. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  4847. </member>
  4848. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec.SecNamedCurves.GetName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4849. <summary>Look up the name of the curve with the given <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  4850. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  4851. </member>
  4852. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec.SecNamedCurves.GetOid(System.String)">
  4853. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> of the curve with the given name.</summary>
  4854. <param name="name">The name of the curve.</param>
  4855. </member>
  4856. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec.SecNamedCurves.Names">
  4857. <summary>Enumerate the available curve names in this registry.</summary>
  4858. </member>
  4859. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec.SecObjectIdentifiers.EllipticCurve">
  4860. EllipticCurve OBJECT IDENTIFIER ::= {
  4861. iso(1) identified-organization(3) certicom(132) curve(0)
  4862. }
  4863. </member>
  4864. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeCapabilities">
  4865. Handler class for dealing with S/MIME Capabilities
  4866. </member>
  4867. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeCapabilities.PreferSignedData">
  4868. general preferences
  4869. </member>
  4870. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeCapabilities.Aes256Cbc">
  4871. encryption algorithms preferences
  4872. </member>
  4873. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeCapabilities.GetInstance(System.Object)">
  4874. return an Attr object from the given object.
  4875. @param o the object we want converted.
  4876. @exception ArgumentException if the object cannot be converted.
  4877. </member>
  4878. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeCapabilities.GetCapabilitiesForOid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4879. returns an ArrayList with 0 or more objects of all the capabilities
  4880. matching the passed in capability Oid. If the Oid passed is null the
  4881. entire set is returned.
  4882. </member>
  4883. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeCapabilities.ToAsn1Object">
  4884. Produce an object suitable for an Asn1OutputStream.
  4885. <pre>
  4886. SMIMECapabilities ::= Sequence OF SMIMECapability
  4887. </pre>
  4888. </member>
  4889. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeCapability.PreferSignedData">
  4890. general preferences
  4891. </member>
  4892. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeCapability.DesCbc">
  4893. encryption algorithms preferences
  4894. </member>
  4895. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeCapability.ToAsn1Object">
  4896. Produce an object suitable for an Asn1OutputStream.
  4897. <pre>
  4898. SMIMECapability ::= Sequence {
  4899. capabilityID OBJECT IDENTIFIER,
  4900. parameters ANY DEFINED BY capabilityID OPTIONAL
  4901. }
  4902. </pre>
  4903. </member>
  4904. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeCapabilityVector">
  4905. Handler for creating a vector S/MIME Capabilities
  4906. </member>
  4907. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeEncryptionKeyPreferenceAttribute">
  4908. The SmimeEncryptionKeyPreference object.
  4909. <pre>
  4910. SmimeEncryptionKeyPreference ::= CHOICE {
  4911. issuerAndSerialNumber [0] IssuerAndSerialNumber,
  4912. receipentKeyId [1] RecipientKeyIdentifier,
  4913. subjectAltKeyIdentifier [2] SubjectKeyIdentifier
  4914. }
  4915. </pre>
  4916. </member>
  4917. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime.SmimeEncryptionKeyPreferenceAttribute.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1OctetString)">
  4918. @param sKeyId the subjectKeyIdentifier value (normally the X.509 one)
  4919. </member>
  4920. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves">
  4921. <summary>Elliptic curve registry for curves defined in "ECC Brainpool Standard Curves and Curve Generation"
  4922. http://www.ecc-brainpool.org/download/draft_pkix_additional_ecc_dp.txt .</summary>
  4923. </member>
  4924. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves.GetByName(System.String)">
  4925. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given name.</summary>
  4926. <param name="name">The name of the curve.</param>
  4927. </member>
  4928. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves.GetByNameLazy(System.String)">
  4929. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given name.</summary>
  4930. <remarks>
  4931. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  4932. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  4933. </remarks>
  4934. <param name="name">The name of the curve.</param>
  4935. </member>
  4936. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves.GetByOid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4937. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given
  4938. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  4939. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  4940. </member>
  4941. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves.GetByOidLazy(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4942. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given
  4943. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  4944. <remarks>
  4945. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  4946. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  4947. </remarks>
  4948. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  4949. </member>
  4950. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves.GetName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4951. <summary>Look up the name of the curve with the given <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  4952. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  4953. </member>
  4954. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves.GetOid(System.String)">
  4955. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> of the curve with the given name.</summary>
  4956. <param name="name">The name of the curve.</param>
  4957. </member>
  4958. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves.Names">
  4959. <summary>Enumerate the available curve names in this registry.</summary>
  4960. </member>
  4961. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp.Accuracy.ToAsn1Object">
  4962. <pre>
  4963. Accuracy ::= SEQUENCE {
  4964. seconds INTEGER OPTIONAL,
  4965. millis [0] INTEGER (1..999) OPTIONAL,
  4966. micros [1] INTEGER (1..999) OPTIONAL
  4967. }
  4968. </pre>
  4969. </member>
  4970. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp.MessageImprint.ToAsn1Object">
  4971. <pre>
  4972. MessageImprint ::= SEQUENCE {
  4973. hashAlgorithm AlgorithmIdentifier,
  4974. hashedMessage OCTET STRING }
  4975. </pre>
  4976. </member>
  4977. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp.TimeStampReq.ToAsn1Object">
  4978. <pre>
  4979. TimeStampReq ::= SEQUENCE {
  4980. version INTEGER { v1(1) },
  4981. messageImprint MessageImprint,
  4982. --a hash algorithm OID and the hash value of the data to be
  4983. --time-stamped
  4984. reqPolicy TSAPolicyId OPTIONAL,
  4985. nonce INTEGER OPTIONAL,
  4986. certReq BOOLEAN DEFAULT FALSE,
  4987. extensions [0] IMPLICIT Extensions OPTIONAL
  4988. }
  4989. </pre>
  4990. </member>
  4991. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp.TimeStampResp.ToAsn1Object">
  4992. <pre>
  4993. TimeStampResp ::= SEQUENCE {
  4994. status PkiStatusInfo,
  4995. timeStampToken TimeStampToken OPTIONAL }
  4996. </pre>
  4997. </member>
  4998. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp.TstInfo.ToAsn1Object">
  4999. <pre>
  5000. TstInfo ::= SEQUENCE {
  5001. version INTEGER { v1(1) },
  5002. policy TSAPolicyId,
  5003. messageImprint MessageImprint,
  5004. -- MUST have the same value as the similar field in
  5005. -- TimeStampReq
  5006. serialNumber INTEGER,
  5007. -- Time-Stamping users MUST be ready to accommodate integers
  5008. -- up to 160 bits.
  5009. genTime GeneralizedTime,
  5010. accuracy Accuracy OPTIONAL,
  5011. ordering BOOLEAN DEFAULT FALSE,
  5012. nonce INTEGER OPTIONAL,
  5013. -- MUST be present if the similar field was present
  5014. -- in TimeStampReq. In that case it MUST have the same value.
  5015. tsa [0] GeneralName OPTIONAL,
  5016. extensions [1] IMPLICIT Extensions OPTIONAL }
  5017. </pre>
  5018. </member>
  5019. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers">
  5020. Ukrainian object identifiers
  5021. <p/>
  5022. {iso(1) member-body(2) Ukraine(804) root(2) security(1) cryptography(1) pki(1)}
  5023. <p/>
  5024. { ... pki-alg(1) pki-alg-sym(3) Dstu4145WithGost34311(1) PB(1)}
  5025. <p/>
  5026. DSTU4145 in polynomial basis has 2 oids, one for little-endian representation and one for big-endian
  5027. </member>
  5028. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.UaOid">
  5029. Base OID: 1.2.804.2.1.1.1
  5030. </member>
  5031. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu4145le">
  5032. DSTU4145 Little Endian presentation. OID: 1.2.804.2.1.1.1.1.3.1.1
  5033. </member>
  5034. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu4145be">
  5035. DSTU4145 Big Endian presentation. OID: 1.2.804.2.1.1.1.1.3.1.1.1
  5036. </member>
  5037. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564digest_256">
  5038. DSTU7564 256-bit digest presentation.
  5039. </member>
  5040. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564digest_384">
  5041. DSTU7564 384-bit digest presentation.
  5042. </member>
  5043. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564digest_512">
  5044. DSTU7564 512-bit digest presentation.
  5045. </member>
  5046. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564mac_256">
  5047. DSTU7564 256-bit mac presentation.
  5048. </member>
  5049. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564mac_384">
  5050. DSTU7564 384-bit mac presentation.
  5051. </member>
  5052. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564mac_512">
  5053. DSTU7564 512-bit mac presentation.
  5054. </member>
  5055. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ecb_128">
  5056. DSTU7624 in ECB mode with 128 bit block/key presentation
  5057. </member>
  5058. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ecb_256">
  5059. DSTU7624 in ECB mode with 256 bit block/key presentation
  5060. </member>
  5061. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ecb_512">
  5062. DSTU7624 in ECB mode with 512 bit block/key presentation
  5063. </member>
  5064. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ctr_128">
  5065. DSTU7624 in CTR mode with 128 bit block/key presentation
  5066. </member>
  5067. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ctr_256">
  5068. DSTU7624 in CTR mode with 256 bit block/key presentation
  5069. </member>
  5070. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ctr_512">
  5071. DSTU7624 in CTR mode with 512 bit block/key presentation
  5072. </member>
  5073. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cfb_128">
  5074. DSTU7624 in CFB mode with 128 bit block/key presentation
  5075. </member>
  5076. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cfb_256">
  5077. DSTU7624 in CFB mode with 256 bit block/key presentation
  5078. </member>
  5079. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cfb_512">
  5080. DSTU7624 in CFB mode with 512 bit block/key presentation
  5081. </member>
  5082. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cmac_128">
  5083. DSTU7624 in MAC mode with 128 bit block/key presentation
  5084. </member>
  5085. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cmac_256">
  5086. DSTU7624 in MAC mode with 256 bit block/key presentation
  5087. </member>
  5088. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cmac_512">
  5089. DSTU7624 in MAC mode with 512 bit block/key presentation
  5090. </member>
  5091. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cbc_128">
  5092. DSTU7624 in CBC mode with 128 bit block/key presentation
  5093. </member>
  5094. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cbc_256">
  5095. DSTU7624 in CBC mode with 256 bit block/key presentation
  5096. </member>
  5097. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cbc_512">
  5098. DSTU7624 in CBC mode with 512 bit block/key presentation
  5099. </member>
  5100. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ofb_128">
  5101. DSTU7624 in OFB mode with 128 bit block/key presentation
  5102. </member>
  5103. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ofb_256">
  5104. DSTU7624 in OFB mode with 256 bit block/key presentation
  5105. </member>
  5106. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ofb_512">
  5107. DSTU7624 in OFB mode with 512 bit block/key presentation
  5108. </member>
  5109. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624gmac_128">
  5110. DSTU7624 in GMAC (GCM witout encryption) mode with 128 bit block/key presentation
  5111. </member>
  5112. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624gmac_256">
  5113. DSTU7624 in GMAC (GCM witout encryption) mode with 256 bit block/key presentation
  5114. </member>
  5115. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624gmac_512">
  5116. DSTU7624 in GMAC (GCM witout encryption) mode with 512 bit block/key presentation
  5117. </member>
  5118. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ccm_128">
  5119. DSTU7624 in CCM mode with 128 bit block/key presentation
  5120. </member>
  5121. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ccm_256">
  5122. DSTU7624 in CCM mode with 256 bit block/key presentation
  5123. </member>
  5124. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ccm_512">
  5125. DSTU7624 in CCM mode with 512 bit block/key presentation
  5126. </member>
  5127. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624xts_128">
  5128. DSTU7624 in XTS mode with 128 bit block/key presentation
  5129. </member>
  5130. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624xts_256">
  5131. DSTU7624 in XTS mode with 256 bit block/key presentation
  5132. </member>
  5133. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624xts_512">
  5134. DSTU7624 in XTS mode with 512 bit block/key presentation
  5135. </member>
  5136. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624kw_128">
  5137. DSTU7624 in key wrap (KW) mode with 128 bit block/key presentation
  5138. </member>
  5139. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624kw_256">
  5140. DSTU7624 in key wrap (KW) mode with 256 bit block/key presentation
  5141. </member>
  5142. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624kw_512">
  5143. DSTU7624 in key wrap (KW) mode with 512 bit block/key presentation
  5144. </member>
  5145. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Utilities.Asn1Dump.AsString(System.String,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Object,System.Text.StringBuilder)">
  5146. dump a Der object as a formatted string with indentation
  5147. @param obj the Asn1Object to be dumped out.
  5148. </member>
  5149. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Utilities.Asn1Dump.Dump(System.IO.Stream,System.IO.TextWriter)">
  5150. <summary>Parse ASN.1 objects from input <see cref="T:System.IO.Stream"/>, and write them to the output.</summary>
  5151. </member>
  5152. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Utilities.Asn1Dump.DumpAsString(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  5153. dump out a DER object as a formatted string, in non-verbose mode
  5154. @param obj the Asn1Encodable to be dumped out.
  5155. @return the resulting string.
  5156. </member>
  5157. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Utilities.Asn1Dump.DumpAsString(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable,System.Boolean)">
  5158. Dump out the object as a string
  5159. @param obj the Asn1Encodable to be dumped out.
  5160. @param verbose if true, dump out the contents of octet and bit strings.
  5161. @return the resulting string.
  5162. </member>
  5163. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.AttributeTypeAndValue">
  5164. Holding class for the AttributeTypeAndValue structures that make up an RDN.
  5165. </member>
  5166. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.AttributeTypeAndValue.ToAsn1Object">
  5167. <pre>
  5168. AttributeTypeAndValue ::= SEQUENCE {
  5169. type OBJECT IDENTIFIER,
  5170. value ANY DEFINED BY type }
  5171. </pre>
  5172. @return a basic ASN.1 object representation.
  5173. </member>
  5174. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.DirectoryString.ToAsn1Object">
  5175. <pre>
  5176. DirectoryString ::= CHOICE {
  5177. teletexString TeletexString (SIZE (1..MAX)),
  5178. printableString PrintableString (SIZE (1..MAX)),
  5179. universalString UniversalString (SIZE (1..MAX)),
  5180. utf8String UTF8String (SIZE (1..MAX)),
  5181. bmpString BMPString (SIZE (1..MAX)) }
  5182. </pre>
  5183. </member>
  5184. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.Rdn">
  5185. Holding class for a single Relative Distinguished Name (RDN).
  5186. </member>
  5187. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.Rdn.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  5188. Create a single valued RDN.
  5189. @param oid RDN type.
  5190. @param value RDN value.
  5191. </member>
  5192. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.Rdn.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.AttributeTypeAndValue[])">
  5193. Create a multi-valued RDN.
  5194. @param aAndVs attribute type/value pairs making up the RDN
  5195. </member>
  5196. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.Rdn.Count">
  5197. Return the number of AttributeTypeAndValue objects in this RDN,
  5198. @return size of RDN, greater than 1 if multi-valued.
  5199. </member>
  5200. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.Rdn.ToAsn1Object">
  5201. * <pre>
  5202. * RelativeDistinguishedName ::=
  5203. * SET OF AttributeTypeAndValue
  5204. * AttributeTypeAndValue ::= SEQUENCE {
  5205. * type AttributeType,
  5206. * value AttributeValue }
  5207. * </pre>
  5208. * @return this object as its ASN1Primitive type
  5209. </member>
  5210. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AccessDescription">
  5211. The AccessDescription object.
  5212. <pre>
  5213. AccessDescription ::= SEQUENCE {
  5214. accessMethod OBJECT IDENTIFIER,
  5215. accessLocation GeneralName }
  5216. </pre>
  5217. </member>
  5218. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AccessDescription.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  5219. create an AccessDescription with the oid and location provided.
  5220. </member>
  5221. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AccessDescription.AccessMethod">
  5222. @return the access method.
  5223. </member>
  5224. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AccessDescription.AccessLocation">
  5225. @return the access location
  5226. </member>
  5227. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier.Algorithm">
  5228. <summary>
  5229. Return the OID in the Algorithm entry of this identifier.
  5230. </summary>
  5231. </member>
  5232. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier.Parameters">
  5233. <summary>
  5234. Return the parameters structure in the Parameters entry of this identifier.
  5235. </summary>
  5236. </member>
  5237. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier.ToAsn1Object">
  5238. Produce an object suitable for an Asn1OutputStream.
  5239. <pre>
  5240. AlgorithmIdentifier ::= Sequence {
  5241. algorithm OBJECT IDENTIFIER,
  5242. parameters ANY DEFINED BY algorithm OPTIONAL }
  5243. </pre>
  5244. </member>
  5245. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AttCertIssuer.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralNames)">
  5246. <summary>
  5247. Don't use this one if you are trying to be RFC 3281 compliant.
  5248. Use it for v1 attribute certificates only.
  5249. </summary>
  5250. <param name="names">Our GeneralNames structure</param>
  5251. </member>
  5252. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AttCertIssuer.ToAsn1Object">
  5253. Produce an object suitable for an Asn1OutputStream.
  5254. <pre>
  5255. AttCertIssuer ::= CHOICE {
  5256. v1Form GeneralNames, -- MUST NOT be used in this
  5257. -- profile
  5258. v2Form [0] V2Form -- v2 only
  5259. }
  5260. </pre>
  5261. </member>
  5262. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AttCertValidityPeriod.ToAsn1Object">
  5263. Produce an object suitable for an Asn1OutputStream.
  5264. <pre>
  5265. AttCertValidityPeriod ::= Sequence {
  5266. notBeforeTime GeneralizedTime,
  5267. notAfterTime GeneralizedTime
  5268. }
  5269. </pre>
  5270. </member>
  5271. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AttributeX509.GetInstance(System.Object)">
  5272. return an Attr object from the given object.
  5273. @param o the object we want converted.
  5274. @exception ArgumentException if the object cannot be converted.
  5275. </member>
  5276. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AttributeX509.ToAsn1Object">
  5277. Produce an object suitable for an Asn1OutputStream.
  5278. <pre>
  5279. Attr ::= Sequence {
  5280. attrType OBJECT IDENTIFIER,
  5281. attrValues Set OF AttributeValue
  5282. }
  5283. </pre>
  5284. </member>
  5285. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AttributeCertificate.GetInstance(System.Object)">
  5286. @param obj
  5287. @return
  5288. </member>
  5289. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AttributeCertificate.ToAsn1Object">
  5290. Produce an object suitable for an Asn1OutputStream.
  5291. <pre>
  5292. AttributeCertificate ::= Sequence {
  5293. acinfo AttributeCertificateInfo,
  5294. signatureAlgorithm AlgorithmIdentifier,
  5295. signatureValue BIT STRING
  5296. }
  5297. </pre>
  5298. </member>
  5299. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AttributeCertificateInfo.ToAsn1Object">
  5300. Produce an object suitable for an Asn1OutputStream.
  5301. <pre>
  5302. AttributeCertificateInfo ::= Sequence {
  5303. version AttCertVersion -- version is v2,
  5304. holder Holder,
  5305. issuer AttCertIssuer,
  5306. signature AlgorithmIdentifier,
  5307. serialNumber CertificateSerialNumber,
  5308. attrCertValidityPeriod AttCertValidityPeriod,
  5309. attributes Sequence OF Attr,
  5310. issuerUniqueID UniqueIdentifier OPTIONAL,
  5311. extensions Extensions OPTIONAL
  5312. }
  5313. AttCertVersion ::= Integer { v2(1) }
  5314. </pre>
  5315. </member>
  5316. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AuthorityInformationAccess">
  5317. The AuthorityInformationAccess object.
  5318. <pre>
  5319. id-pe-authorityInfoAccess OBJECT IDENTIFIER ::= { id-pe 1 }
  5320. AuthorityInfoAccessSyntax ::=
  5321. Sequence SIZE (1..MAX) OF AccessDescription
  5322. AccessDescription ::= Sequence {
  5323. accessMethod OBJECT IDENTIFIER,
  5324. accessLocation GeneralName }
  5325. id-ad OBJECT IDENTIFIER ::= { id-pkix 48 }
  5326. id-ad-caIssuers OBJECT IDENTIFIER ::= { id-ad 2 }
  5327. id-ad-ocsp OBJECT IDENTIFIER ::= { id-ad 1 }
  5328. </pre>
  5329. </member>
  5330. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AuthorityInformationAccess.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  5331. create an AuthorityInformationAccess with the oid and location provided.
  5332. </member>
  5333. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier">
  5334. The AuthorityKeyIdentifier object.
  5335. <pre>
  5336. id-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 35 }
  5337. AuthorityKeyIdentifier ::= Sequence {
  5338. keyIdentifier [0] IMPLICIT KeyIdentifier OPTIONAL,
  5339. authorityCertIssuer [1] IMPLICIT GeneralNames OPTIONAL,
  5340. authorityCertSerialNumber [2] IMPLICIT CertificateSerialNumber OPTIONAL }
  5341. KeyIdentifier ::= OCTET STRING
  5342. </pre>
  5343. </member>
  5344. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  5345. *
  5346. * Calulates the keyidentifier using a SHA1 hash over the BIT STRING
  5347. * from SubjectPublicKeyInfo as defined in RFC2459.
  5348. *
  5349. * Example of making a AuthorityKeyIdentifier:
  5350. * <pre>
  5351. * SubjectPublicKeyInfo apki = new SubjectPublicKeyInfo((ASN1Sequence)new ASN1InputStream(
  5352. * publicKey.getEncoded()).readObject());
  5353. * AuthorityKeyIdentifier aki = new AuthorityKeyIdentifier(apki);
  5354. * </pre>
  5355. *
  5356. *
  5357. </member>
  5358. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralNames,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  5359. create an AuthorityKeyIdentifier with the GeneralNames tag and
  5360. the serial number provided as well.
  5361. </member>
  5362. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralNames,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  5363. create an AuthorityKeyIdentifier with the GeneralNames tag and
  5364. the serial number provided.
  5365. </member>
  5366. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.#ctor(System.Byte[])">
  5367. create an AuthorityKeyIdentifier with a precomputed key identifier
  5368. </member>
  5369. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.#ctor(System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralNames,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  5370. create an AuthorityKeyIdentifier with a precomupted key identifier
  5371. and the GeneralNames tag and the serial number provided as well.
  5372. </member>
  5373. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.ToAsn1Object">
  5374. Produce an object suitable for an Asn1OutputStream.
  5375. </member>
  5376. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.BasicConstraints.#ctor(System.Int32)">
  5377. create a cA=true object for the given path length constraint.
  5378. @param pathLenConstraint
  5379. </member>
  5380. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.BasicConstraints.ToAsn1Object">
  5381. Produce an object suitable for an Asn1OutputStream.
  5382. <pre>
  5383. BasicConstraints := Sequence {
  5384. cA Boolean DEFAULT FALSE,
  5385. pathLenConstraint Integer (0..MAX) OPTIONAL
  5386. }
  5387. </pre>
  5388. </member>
  5389. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CertificateList">
  5390. PKIX RFC-2459
  5391. The X.509 v2 CRL syntax is as follows. For signature calculation,
  5392. the data that is to be signed is ASN.1 Der encoded.
  5393. <pre>
  5394. CertificateList ::= Sequence {
  5395. tbsCertList TbsCertList,
  5396. signatureAlgorithm AlgorithmIdentifier,
  5397. signatureValue BIT STRING }
  5398. </pre>
  5399. </member>
  5400. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CertificatePair">
  5401. This class helps to support crossCerfificatePairs in a LDAP directory
  5402. according RFC 2587
  5403. <pre>
  5404. crossCertificatePairATTRIBUTE::={
  5405. WITH SYNTAX CertificatePair
  5406. EQUALITY MATCHING RULE certificatePairExactMatch
  5407. ID joint-iso-ccitt(2) ds(5) attributeType(4) crossCertificatePair(40)}
  5408. </pre>
  5409. <blockquote> The forward elements of the crossCertificatePair attribute of a
  5410. CA's directory entry shall be used to store all, except self-issued
  5411. certificates issued to this CA. Optionally, the reverse elements of the
  5412. crossCertificatePair attribute, of a CA's directory entry may contain a
  5413. subset of certificates issued by this CA to other CAs. When both the forward
  5414. and the reverse elements are present in a single attribute value, issuer name
  5415. in one certificate shall match the subject name in the other and vice versa,
  5416. and the subject public key in one certificate shall be capable of verifying
  5417. the digital signature on the other certificate and vice versa.
  5418. When a reverse element is present, the forward element value and the reverse
  5419. element value need not be stored in the same attribute value; in other words,
  5420. they can be stored in either a single attribute value or two attribute
  5421. values. </blockquote>
  5422. <pre>
  5423. CertificatePair ::= SEQUENCE {
  5424. forward [0] Certificate OPTIONAL,
  5425. reverse [1] Certificate OPTIONAL,
  5426. -- at least one of the pair shall be present -- }
  5427. </pre>
  5428. </member>
  5429. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CertificatePair.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  5430. Constructor from Asn1Sequence.
  5431. <p/>
  5432. The sequence is of type CertificatePair:
  5433. <p/>
  5434. <pre>
  5435. CertificatePair ::= SEQUENCE {
  5436. forward [0] Certificate OPTIONAL,
  5437. reverse [1] Certificate OPTIONAL,
  5438. -- at least one of the pair shall be present -- }
  5439. </pre>
  5440. @param seq The ASN.1 sequence.
  5441. </member>
  5442. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CertificatePair.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509CertificateStructure,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509CertificateStructure)">
  5443. Constructor from a given details.
  5444. @param forward Certificates issued to this CA.
  5445. @param reverse Certificates issued by this CA to other CAs.
  5446. </member>
  5447. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CertificatePair.ToAsn1Object">
  5448. Produce an object suitable for an Asn1OutputStream.
  5449. <p/>
  5450. Returns:
  5451. <p/>
  5452. <pre>
  5453. CertificatePair ::= SEQUENCE {
  5454. forward [0] Certificate OPTIONAL,
  5455. reverse [1] Certificate OPTIONAL,
  5456. -- at least one of the pair shall be present -- }
  5457. </pre>
  5458. @return a DERObject
  5459. </member>
  5460. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CertificatePair.Forward">
  5461. @return Returns the forward.
  5462. </member>
  5463. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CertificatePair.Reverse">
  5464. @return Returns the reverse.
  5465. </member>
  5466. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CertificatePolicies.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PolicyInformation)">
  5467. Construct a CertificatePolicies object containing one PolicyInformation.
  5468. @param name the name to be contained.
  5469. </member>
  5470. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CertificatePolicies.ToAsn1Object">
  5471. Produce an object suitable for an ASN1OutputStream.
  5472. <pre>
  5473. CertificatePolicies ::= SEQUENCE SIZE {1..MAX} OF PolicyInformation
  5474. </pre>
  5475. </member>
  5476. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CertPolicyID">
  5477. CertPolicyId, used in the CertificatePolicies and PolicyMappings
  5478. X509V3 Extensions.
  5479. <pre>
  5480. CertPolicyId ::= OBJECT IDENTIFIER
  5481. </pre>
  5482. </member>
  5483. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CrlDistPoint.GetDistributionPoints">
  5484. Return the distribution points making up the sequence.
  5485. @return DistributionPoint[]
  5486. </member>
  5487. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CrlDistPoint.ToAsn1Object">
  5488. Produce an object suitable for an Asn1OutputStream.
  5489. <pre>
  5490. CrlDistPoint ::= Sequence SIZE {1..MAX} OF DistributionPoint
  5491. </pre>
  5492. </member>
  5493. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CrlNumber">
  5494. The CRLNumber object.
  5495. <pre>
  5496. CRLNumber::= Integer(0..MAX)
  5497. </pre>
  5498. </member>
  5499. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CrlReason">
  5500. The CRLReason enumeration.
  5501. <pre>
  5502. CRLReason ::= Enumerated {
  5503. unspecified (0),
  5504. keyCompromise (1),
  5505. cACompromise (2),
  5506. affiliationChanged (3),
  5507. superseded (4),
  5508. cessationOfOperation (5),
  5509. certificateHold (6),
  5510. removeFromCRL (8),
  5511. privilegeWithdrawn (9),
  5512. aACompromise (10)
  5513. }
  5514. </pre>
  5515. </member>
  5516. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DigestInfo">
  5517. The DigestInfo object.
  5518. <pre>
  5519. DigestInfo::=Sequence{
  5520. digestAlgorithm AlgorithmIdentifier,
  5521. digest OCTET STRING }
  5522. </pre>
  5523. </member>
  5524. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText">
  5525. <code>DisplayText</code> class, used in
  5526. <code>CertificatePolicies</code> X509 V3 extensions (in policy qualifiers).
  5527. <p>It stores a string in a chosen encoding.
  5528. <pre>
  5529. DisplayText ::= CHOICE {
  5530. ia5String IA5String (SIZE (1..200)),
  5531. visibleString VisibleString (SIZE (1..200)),
  5532. bmpString BMPString (SIZE (1..200)),
  5533. utf8String UTF8String (SIZE (1..200)) }
  5534. </pre></p>
  5535. @see PolicyQualifierInfo
  5536. @see PolicyInformation
  5537. </member>
  5538. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText.ContentTypeIA5String">
  5539. Constant corresponding to ia5String encoding.
  5540. </member>
  5541. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText.ContentTypeBmpString">
  5542. Constant corresponding to bmpString encoding.
  5543. </member>
  5544. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText.ContentTypeUtf8String">
  5545. Constant corresponding to utf8String encoding.
  5546. </member>
  5547. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText.ContentTypeVisibleString">
  5548. Constant corresponding to visibleString encoding.
  5549. </member>
  5550. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText.DisplayTextMaximumSize">
  5551. Describe constant <code>DisplayTextMaximumSize</code> here.
  5552. </member>
  5553. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText.#ctor(System.Int32,System.String)">
  5554. Creates a new <code>DisplayText</code> instance.
  5555. @param type the desired encoding type for the text.
  5556. @param text the text to store. Strings longer than 200
  5557. characters are truncated.
  5558. </member>
  5559. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText.#ctor(System.String)">
  5560. Creates a new <code>DisplayText</code> instance.
  5561. @param text the text to encapsulate. Strings longer than 200
  5562. characters are truncated.
  5563. </member>
  5564. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IAsn1String)">
  5565. Creates a new <code>DisplayText</code> instance.
  5566. <p>Useful when reading back a <code>DisplayText</code> class
  5567. from it's Asn1Encodable form.</p>
  5568. @param contents an <code>Asn1Encodable</code> instance.
  5569. </member>
  5570. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText.GetString">
  5571. Returns the stored <code>string</code> object.
  5572. @return the stored text as a <code>string</code>.
  5573. </member>
  5574. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DistributionPoint">
  5575. The DistributionPoint object.
  5576. <pre>
  5577. DistributionPoint ::= Sequence {
  5578. distributionPoint [0] DistributionPointName OPTIONAL,
  5579. reasons [1] ReasonFlags OPTIONAL,
  5580. cRLIssuer [2] GeneralNames OPTIONAL
  5581. }
  5582. </pre>
  5583. </member>
  5584. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DistributionPointName">
  5585. The DistributionPointName object.
  5586. <pre>
  5587. DistributionPointName ::= CHOICE {
  5588. fullName [0] GeneralNames,
  5589. nameRelativeToCRLIssuer [1] RDN
  5590. }
  5591. </pre>
  5592. </member>
  5593. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ExtendedKeyUsage">
  5594. The extendedKeyUsage object.
  5595. <pre>
  5596. extendedKeyUsage ::= Sequence SIZE (1..MAX) OF KeyPurposeId
  5597. </pre>
  5598. </member>
  5599. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ExtendedKeyUsage.GetAllUsages">
  5600. Returns all extended key usages.
  5601. The returned ArrayList contains DerObjectIdentifier instances.
  5602. @return An ArrayList with all key purposes.
  5603. </member>
  5604. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName">
  5605. The GeneralName object.
  5606. <pre>
  5607. GeneralName ::= CHOICE {
  5608. otherName [0] OtherName,
  5609. rfc822Name [1] IA5String,
  5610. dNSName [2] IA5String,
  5611. x400Address [3] ORAddress,
  5612. directoryName [4] Name,
  5613. ediPartyName [5] EDIPartyName,
  5614. uniformResourceIdentifier [6] IA5String,
  5615. iPAddress [7] OCTET STRING,
  5616. registeredID [8] OBJECT IDENTIFIER}
  5617. OtherName ::= Sequence {
  5618. type-id OBJECT IDENTIFIER,
  5619. value [0] EXPLICIT ANY DEFINED BY type-id }
  5620. EDIPartyName ::= Sequence {
  5621. nameAssigner [0] DirectoryString OPTIONAL,
  5622. partyName [1] DirectoryString }
  5623. </pre>
  5624. </member>
  5625. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Object,System.Int32)">
  5626. When the subjectAltName extension contains an Internet mail address,
  5627. the address MUST be included as an rfc822Name. The format of an
  5628. rfc822Name is an "addr-spec" as defined in RFC 822 [RFC 822].
  5629. When the subjectAltName extension contains a domain name service
  5630. label, the domain name MUST be stored in the dNSName (an IA5String).
  5631. The name MUST be in the "preferred name syntax," as specified by RFC
  5632. 1034 [RFC 1034].
  5633. When the subjectAltName extension contains a URI, the name MUST be
  5634. stored in the uniformResourceIdentifier (an IA5String). The name MUST
  5635. be a non-relative URL, and MUST follow the URL syntax and encoding
  5636. rules specified in [RFC 1738]. The name must include both a scheme
  5637. (e.g., "http" or "ftp") and a scheme-specific-part. The scheme-
  5638. specific-part must include a fully qualified domain name or IP
  5639. address as the host.
  5640. When the subjectAltName extension contains a iPAddress, the address
  5641. MUST be stored in the octet string in "network byte order," as
  5642. specified in RFC 791 [RFC 791]. The least significant bit (LSB) of
  5643. each octet is the LSB of the corresponding byte in the network
  5644. address. For IP Version 4, as specified in RFC 791, the octet string
  5645. MUST contain exactly four octets. For IP Version 6, as specified in
  5646. RFC 1883, the octet string MUST contain exactly sixteen octets [RFC
  5647. 1883].
  5648. </member>
  5649. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName.#ctor(System.Int32,System.String)">
  5650. Create a GeneralName for the given tag from the passed in string.
  5651. <p>
  5652. This constructor can handle:
  5653. <ul>
  5654. <li>rfc822Name</li>
  5655. <li>iPAddress</li>
  5656. <li>directoryName</li>
  5657. <li>dNSName</li>
  5658. <li>uniformResourceIdentifier</li>
  5659. <li>registeredID</li>
  5660. </ul>
  5661. For x400Address, otherName and ediPartyName there is no common string
  5662. format defined.
  5663. </p><p>
  5664. Note: A directory name can be encoded in different ways into a byte
  5665. representation. Be aware of this if the byte representation is used for
  5666. comparing results.
  5667. </p>
  5668. @param tag tag number
  5669. @param name string representation of name
  5670. @throws ArgumentException if the string encoding is not correct or
  5671. not supported.
  5672. </member>
  5673. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralNames.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  5674. <summary>Construct a GeneralNames object containing one GeneralName.</summary>
  5675. <param name="name">The name to be contained.</param>
  5676. </member>
  5677. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralNames.ToAsn1Object">
  5678. Produce an object suitable for an Asn1OutputStream.
  5679. <pre>
  5680. GeneralNames ::= Sequence SIZE {1..MAX} OF GeneralName
  5681. </pre>
  5682. </member>
  5683. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralSubtree">
  5684. Class for containing a restriction object subtrees in NameConstraints. See
  5685. RFC 3280.
  5686. <pre>
  5687. GeneralSubtree ::= SEQUENCE
  5688. {
  5689. baseName GeneralName,
  5690. minimum [0] BaseDistance DEFAULT 0,
  5691. maximum [1] BaseDistance OPTIONAL
  5692. }
  5693. </pre>
  5694. @see org.bouncycastle.asn1.x509.NameConstraints
  5695. </member>
  5696. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralSubtree.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  5697. Constructor from a given details.
  5698. According RFC 3280, the minimum and maximum fields are not used with any
  5699. name forms, thus minimum MUST be zero, and maximum MUST be absent.
  5700. <p>
  5701. If minimum is <code>null</code>, zero is assumed, if
  5702. maximum is <code>null</code>, maximum is absent.</p>
  5703. @param baseName
  5704. A restriction.
  5705. @param minimum
  5706. Minimum
  5707. @param maximum
  5708. Maximum
  5709. </member>
  5710. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralSubtree.ToAsn1Object">
  5711. Produce an object suitable for an Asn1OutputStream.
  5712. Returns:
  5713. <pre>
  5714. GeneralSubtree ::= SEQUENCE
  5715. {
  5716. baseName GeneralName,
  5717. minimum [0] BaseDistance DEFAULT 0,
  5718. maximum [1] BaseDistance OPTIONAL
  5719. }
  5720. </pre>
  5721. @return a DERObject
  5722. </member>
  5723. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Holder">
  5724. The Holder object.
  5725. <p>
  5726. For an v2 attribute certificate this is:
  5727. <pre>
  5728. Holder ::= SEQUENCE {
  5729. baseCertificateID [0] IssuerSerial OPTIONAL,
  5730. -- the issuer and serial number of
  5731. -- the holder's Public Key Certificate
  5732. entityName [1] GeneralNames OPTIONAL,
  5733. -- the name of the claimant or role
  5734. objectDigestInfo [2] ObjectDigestInfo OPTIONAL
  5735. -- used to directly authenticate the holder,
  5736. -- for example, an executable
  5737. }
  5738. </pre>
  5739. </p>
  5740. <p>
  5741. For an v1 attribute certificate this is:
  5742. <pre>
  5743. subject CHOICE {
  5744. baseCertificateID [0] EXPLICIT IssuerSerial,
  5745. -- associated with a Public Key Certificate
  5746. subjectName [1] EXPLICIT GeneralNames },
  5747. -- associated with a name
  5748. </pre>
  5749. </p>
  5750. </member>
  5751. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Holder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject)">
  5752. Constructor for a holder for an v1 attribute certificate.
  5753. @param tagObj The ASN.1 tagged holder object.
  5754. </member>
  5755. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Holder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  5756. Constructor for a holder for an v2 attribute certificate. *
  5757. @param seq The ASN.1 sequence.
  5758. </member>
  5759. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Holder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.IssuerSerial,System.Int32)">
  5760. Constructs a holder from a IssuerSerial.
  5761. @param baseCertificateID The IssuerSerial.
  5762. @param version The version of the attribute certificate.
  5763. </member>
  5764. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Holder.Version">
  5765. Returns 1 for v2 attribute certificates or 0 for v1 attribute
  5766. certificates.
  5767. @return The version of the attribute certificate.
  5768. </member>
  5769. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Holder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralNames)">
  5770. Constructs a holder with an entityName for v2 attribute certificates or
  5771. with a subjectName for v1 attribute certificates.
  5772. @param entityName The entity or subject name.
  5773. </member>
  5774. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Holder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralNames,System.Int32)">
  5775. Constructs a holder with an entityName for v2 attribute certificates or
  5776. with a subjectName for v1 attribute certificates.
  5777. @param entityName The entity or subject name.
  5778. @param version The version of the attribute certificate.
  5779. </member>
  5780. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Holder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ObjectDigestInfo)">
  5781. Constructs a holder from an object digest info.
  5782. @param objectDigestInfo The object digest info object.
  5783. </member>
  5784. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Holder.EntityName">
  5785. Returns the entityName for an v2 attribute certificate or the subjectName
  5786. for an v1 attribute certificate.
  5787. @return The entityname or subjectname.
  5788. </member>
  5789. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Holder.ToAsn1Object">
  5790. The Holder object.
  5791. <pre>
  5792. Holder ::= Sequence {
  5793. baseCertificateID [0] IssuerSerial OPTIONAL,
  5794. -- the issuer and serial number of
  5795. -- the holder's Public Key Certificate
  5796. entityName [1] GeneralNames OPTIONAL,
  5797. -- the name of the claimant or role
  5798. objectDigestInfo [2] ObjectDigestInfo OPTIONAL
  5799. -- used to directly authenticate the holder,
  5800. -- for example, an executable
  5801. }
  5802. </pre>
  5803. </member>
  5804. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.IetfAttrSyntax">
  5805. Implementation of <code>IetfAttrSyntax</code> as specified by RFC3281.
  5806. </member>
  5807. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.IetfAttrSyntax.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  5808. </member>
  5809. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.IetfAttrSyntax.ToAsn1Object">
  5810. <pre>
  5811. IetfAttrSyntax ::= Sequence {
  5812. policyAuthority [0] GeneralNames OPTIONAL,
  5813. values Sequence OF CHOICE {
  5814. octets OCTET STRING,
  5815. oid OBJECT IDENTIFIER,
  5816. string UTF8String
  5817. }
  5818. }
  5819. </pre>
  5820. </member>
  5821. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.IssuerSerial.ToAsn1Object">
  5822. Produce an object suitable for an Asn1OutputStream.
  5823. <pre>
  5824. IssuerSerial ::= Sequence {
  5825. issuer GeneralNames,
  5826. serial CertificateSerialNumber,
  5827. issuerUid UniqueIdentifier OPTIONAL
  5828. }
  5829. </pre>
  5830. </member>
  5831. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.IssuingDistributionPoint">
  5832. <pre>
  5833. IssuingDistributionPoint ::= SEQUENCE {
  5834. distributionPoint [0] DistributionPointName OPTIONAL,
  5835. onlyContainsUserCerts [1] BOOLEAN DEFAULT FALSE,
  5836. onlyContainsCACerts [2] BOOLEAN DEFAULT FALSE,
  5837. onlySomeReasons [3] ReasonFlags OPTIONAL,
  5838. indirectCRL [4] BOOLEAN DEFAULT FALSE,
  5839. onlyContainsAttributeCerts [5] BOOLEAN DEFAULT FALSE }
  5840. </pre>
  5841. </member>
  5842. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.IssuingDistributionPoint.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DistributionPointName,System.Boolean,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ReasonFlags,System.Boolean,System.Boolean)">
  5843. Constructor from given details.
  5844. @param distributionPoint
  5845. May contain an URI as pointer to most current CRL.
  5846. @param onlyContainsUserCerts Covers revocation information for end certificates.
  5847. @param onlyContainsCACerts Covers revocation information for CA certificates.
  5848. @param onlySomeReasons
  5849. Which revocation reasons does this point cover.
  5850. @param indirectCRL
  5851. If <code>true</code> then the CRL contains revocation
  5852. information about certificates ssued by other CAs.
  5853. @param onlyContainsAttributeCerts Covers revocation information for attribute certificates.
  5854. </member>
  5855. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.IssuingDistributionPoint.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  5856. Constructor from Asn1Sequence
  5857. </member>
  5858. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.IssuingDistributionPoint.DistributionPoint">
  5859. @return Returns the distributionPoint.
  5860. </member>
  5861. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.IssuingDistributionPoint.OnlySomeReasons">
  5862. @return Returns the onlySomeReasons.
  5863. </member>
  5864. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.KeyPurposeID">
  5865. The KeyPurposeID object.
  5866. <pre>
  5867. KeyPurposeID ::= OBJECT IDENTIFIER
  5868. </pre>
  5869. </member>
  5870. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.KeyPurposeID.id_kp_msSGC">
  5871. <summary>Microsoft Server Gated Crypto (msSGC).</summary>
  5872. <remarks>see https://www.alvestrand.no/objectid/1.3.6.1.4.1.311.10.3.3.html</remarks>
  5873. </member>
  5874. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.KeyPurposeID.id_kp_nsSGC">
  5875. <summary>Netscape Server Gated Crypto (nsSGC).</summary>
  5876. <remarks>see https://www.alvestrand.no/objectid/2.16.840.1.113730.4.1.html</remarks>
  5877. </member>
  5878. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.KeyUsage">
  5879. The KeyUsage object.
  5880. <pre>
  5881. id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 }
  5882. KeyUsage ::= BIT STRING {
  5883. digitalSignature (0),
  5884. nonRepudiation (1),
  5885. keyEncipherment (2),
  5886. dataEncipherment (3),
  5887. keyAgreement (4),
  5888. keyCertSign (5),
  5889. cRLSign (6),
  5890. encipherOnly (7),
  5891. decipherOnly (8) }
  5892. </pre>
  5893. </member>
  5894. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.KeyUsage.#ctor(System.Int32)">
  5895. Basic constructor.
  5896. @param usage - the bitwise OR of the Key Usage flags giving the
  5897. allowed uses for the key.
  5898. e.g. (KeyUsage.keyEncipherment | KeyUsage.dataEncipherment)
  5899. </member>
  5900. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.NameConstraints.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralSubtree},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralSubtree})">
  5901. Constructor from a given details.
  5902. <p>permitted and excluded are Vectors of GeneralSubtree objects.</p>
  5903. @param permitted Permitted subtrees
  5904. @param excluded Excluded subtrees
  5905. </member>
  5906. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.NoticeReference">
  5907. <code>NoticeReference</code> class, used in
  5908. <code>CertificatePolicies</code> X509 V3 extensions
  5909. (in policy qualifiers).
  5910. <pre>
  5911. NoticeReference ::= Sequence {
  5912. organization DisplayText,
  5913. noticeNumbers Sequence OF Integer }
  5914. </pre>
  5915. @see PolicyQualifierInfo
  5916. @see PolicyInformation
  5917. </member>
  5918. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.NoticeReference.#ctor(System.String,System.Collections.Generic.IList{System.Object})">
  5919. Creates a new <code>NoticeReference</code> instance.
  5920. @param organization a <code>String</code> value
  5921. @param numbers a <code>Vector</code> value
  5922. </member>
  5923. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.NoticeReference.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  5924. Creates a new <code>NoticeReference</code> instance.
  5925. @param organization a <code>String</code> value
  5926. @param noticeNumbers an <code>ASN1EncodableVector</code> value
  5927. </member>
  5928. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.NoticeReference.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  5929. Creates a new <code>NoticeReference</code> instance.
  5930. @param organization displayText
  5931. @param noticeNumbers an <code>ASN1EncodableVector</code> value
  5932. </member>
  5933. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.NoticeReference.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  5934. Creates a new <code>NoticeReference</code> instance.
  5935. <p>Useful for reconstructing a <code>NoticeReference</code>
  5936. instance from its encodable/encoded form.</p>
  5937. @param as an <code>Asn1Sequence</code> value obtained from either
  5938. calling @{link ToAsn1Object()} for a <code>NoticeReference</code>
  5939. instance or from parsing it from a Der-encoded stream.
  5940. </member>
  5941. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.NoticeReference.ToAsn1Object">
  5942. Describe <code>ToAsn1Object</code> method here.
  5943. @return a <code>Asn1Object</code> value
  5944. </member>
  5945. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ObjectDigestInfo">
  5946. ObjectDigestInfo ASN.1 structure used in v2 attribute certificates.
  5947. <pre>
  5948. ObjectDigestInfo ::= SEQUENCE {
  5949. digestedObjectType ENUMERATED {
  5950. publicKey (0),
  5951. publicKeyCert (1),
  5952. otherObjectTypes (2) },
  5953. -- otherObjectTypes MUST NOT
  5954. -- be used in this profile
  5955. otherObjectTypeID OBJECT IDENTIFIER OPTIONAL,
  5956. digestAlgorithm AlgorithmIdentifier,
  5957. objectDigest BIT STRING
  5958. }
  5959. </pre>
  5960. </member>
  5961. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ObjectDigestInfo.PublicKey">
  5962. The public key is hashed.
  5963. </member>
  5964. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ObjectDigestInfo.PublicKeyCert">
  5965. The public key certificate is hashed.
  5966. </member>
  5967. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ObjectDigestInfo.OtherObjectDigest">
  5968. An other object is hashed.
  5969. </member>
  5970. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ObjectDigestInfo.#ctor(System.Int32,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier,System.Byte[])">
  5971. Constructor from given details.
  5972. <p>
  5973. If <code>digestedObjectType</code> is not {@link #publicKeyCert} or
  5974. {@link #publicKey} <code>otherObjectTypeID</code> must be given,
  5975. otherwise it is ignored.</p>
  5976. @param digestedObjectType The digest object type.
  5977. @param otherObjectTypeID The object type ID for
  5978. <code>otherObjectDigest</code>.
  5979. @param digestAlgorithm The algorithm identifier for the hash.
  5980. @param objectDigest The hash value.
  5981. </member>
  5982. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ObjectDigestInfo.ToAsn1Object">
  5983. Produce an object suitable for an Asn1OutputStream.
  5984. <pre>
  5985. ObjectDigestInfo ::= SEQUENCE {
  5986. digestedObjectType ENUMERATED {
  5987. publicKey (0),
  5988. publicKeyCert (1),
  5989. otherObjectTypes (2) },
  5990. -- otherObjectTypes MUST NOT
  5991. -- be used in this profile
  5992. otherObjectTypeID OBJECT IDENTIFIER OPTIONAL,
  5993. digestAlgorithm AlgorithmIdentifier,
  5994. objectDigest BIT STRING
  5995. }
  5996. </pre>
  5997. </member>
  5998. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.OtherName">
  5999. The OtherName object.
  6000. <pre>
  6001. OtherName ::= SEQUENCE {
  6002. type-id OBJECT IDENTIFIER,
  6003. value [0] EXPLICIT ANY DEFINED BY type-id }
  6004. </pre>
  6005. </member>
  6006. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.OtherName.GetInstance(System.Object)">
  6007. OtherName factory method.
  6008. @param obj the object used to construct an instance of <code>
  6009. OtherName</code>. It must be an instance of <code>OtherName
  6010. </code> or <code>ASN1Sequence</code>.
  6011. @return the instance of <code>OtherName</code> built from the
  6012. supplied object.
  6013. @throws java.lang.IllegalArgumentException if the object passed
  6014. to the factory is not an instance of <code>OtherName</code> or something that
  6015. can be converted into an appropriate <code>ASN1Sequence</code>.
  6016. </member>
  6017. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.OtherName.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  6018. Base constructor.
  6019. @param typeID the type of the other name.
  6020. @param value the ANY object that represents the value.
  6021. </member>
  6022. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PolicyMappings">
  6023. PolicyMappings V3 extension, described in RFC3280.
  6024. <pre>
  6025. PolicyMappings ::= Sequence SIZE (1..MAX) OF Sequence {
  6026. issuerDomainPolicy CertPolicyId,
  6027. subjectDomainPolicy CertPolicyId }
  6028. </pre>
  6029. @see <a href="http://www.faqs.org/rfc/rfc3280.txt">RFC 3280, section 4.2.1.6</a>
  6030. </member>
  6031. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PolicyMappings.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  6032. Creates a new <code>PolicyMappings</code> instance.
  6033. @param seq an <code>Asn1Sequence</code> constructed as specified
  6034. in RFC 3280
  6035. </member>
  6036. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PolicyMappings.#ctor(System.Collections.Generic.IDictionary{System.String,System.String})">
  6037. Creates a new <code>PolicyMappings</code> instance.
  6038. @param mappings a <code>HashMap</code> value that maps
  6039. <code>string</code> oids
  6040. to other <code>string</code> oids.
  6041. </member>
  6042. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PolicyQualifierID">
  6043. PolicyQualifierId, used in the CertificatePolicies
  6044. X509V3 extension.
  6045. <pre>
  6046. id-qt OBJECT IDENTIFIER ::= { id-pkix 2 }
  6047. id-qt-cps OBJECT IDENTIFIER ::= { id-qt 1 }
  6048. id-qt-unotice OBJECT IDENTIFIER ::= { id-qt 2 }
  6049. PolicyQualifierId ::=
  6050. OBJECT IDENTIFIER ( id-qt-cps | id-qt-unotice )
  6051. </pre>
  6052. </member>
  6053. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PolicyQualifierInfo">
  6054. Policy qualifiers, used in the X509V3 CertificatePolicies
  6055. extension.
  6056. <pre>
  6057. PolicyQualifierInfo ::= Sequence {
  6058. policyQualifierId PolicyQualifierId,
  6059. qualifier ANY DEFINED BY policyQualifierId }
  6060. </pre>
  6061. </member>
  6062. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PolicyQualifierInfo.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  6063. Creates a new <code>PolicyQualifierInfo</code> instance.
  6064. @param policyQualifierId a <code>PolicyQualifierId</code> value
  6065. @param qualifier the qualifier, defined by the above field.
  6066. </member>
  6067. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PolicyQualifierInfo.#ctor(System.String)">
  6068. Creates a new <code>PolicyQualifierInfo</code> containing a
  6069. cPSuri qualifier.
  6070. @param cps the CPS (certification practice statement) uri as a
  6071. <code>string</code>.
  6072. </member>
  6073. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PolicyQualifierInfo.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  6074. Creates a new <code>PolicyQualifierInfo</code> instance.
  6075. @param as <code>PolicyQualifierInfo</code> X509 structure
  6076. encoded as an Asn1Sequence.
  6077. </member>
  6078. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PolicyQualifierInfo.ToAsn1Object">
  6079. Returns a Der-encodable representation of this instance.
  6080. @return a <code>Asn1Object</code> value
  6081. </member>
  6082. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PrivateKeyUsagePeriod">
  6083. <remarks>
  6084. <pre>
  6085. PrivateKeyUsagePeriod ::= SEQUENCE
  6086. {
  6087. notBefore [0] GeneralizedTime OPTIONAL,
  6088. notAfter [1] GeneralizedTime OPTIONAL }
  6089. </pre>
  6090. </remarks>
  6091. </member>
  6092. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified.BiometricData">
  6093. The BiometricData object.
  6094. <pre>
  6095. BiometricData ::= SEQUENCE {
  6096. typeOfBiometricData TypeOfBiometricData,
  6097. hashAlgorithm AlgorithmIdentifier,
  6098. biometricDataHash OCTET STRING,
  6099. sourceDataUri IA5String OPTIONAL }
  6100. </pre>
  6101. </member>
  6102. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified.Iso4217CurrencyCode">
  6103. The Iso4217CurrencyCode object.
  6104. <pre>
  6105. Iso4217CurrencyCode ::= CHOICE {
  6106. alphabetic PrintableString (SIZE 3), --Recommended
  6107. numeric INTEGER (1..999) }
  6108. -- Alphabetic or numeric currency code as defined in ISO 4217
  6109. -- It is recommended that the Alphabetic form is used
  6110. </pre>
  6111. </member>
  6112. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified.MonetaryValue">
  6113. The MonetaryValue object.
  6114. <pre>
  6115. MonetaryValue ::= SEQUENCE {
  6116. currency Iso4217CurrencyCode,
  6117. amount INTEGER,
  6118. exponent INTEGER }
  6119. -- value = amount * 10^exponent
  6120. </pre>
  6121. </member>
  6122. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified.QCStatement">
  6123. The QCStatement object.
  6124. <pre>
  6125. QCStatement ::= SEQUENCE {
  6126. statementId OBJECT IDENTIFIER,
  6127. statementInfo ANY DEFINED BY statementId OPTIONAL}
  6128. </pre>
  6129. </member>
  6130. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified.SemanticsInformation">
  6131. The SemanticsInformation object.
  6132. <pre>
  6133. SemanticsInformation ::= SEQUENCE {
  6134. semanticsIdentifier OBJECT IDENTIFIER OPTIONAL,
  6135. nameRegistrationAuthorities NameRegistrationAuthorities
  6136. OPTIONAL }
  6137. (WITH COMPONENTS {..., semanticsIdentifier PRESENT}|
  6138. WITH COMPONENTS {..., nameRegistrationAuthorities PRESENT})
  6139. NameRegistrationAuthorities ::= SEQUENCE SIZE (1..MAX) OF
  6140. GeneralName
  6141. </pre>
  6142. </member>
  6143. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified.TypeOfBiometricData">
  6144. The TypeOfBiometricData object.
  6145. <pre>
  6146. TypeOfBiometricData ::= CHOICE {
  6147. predefinedBiometricType PredefinedBiometricType,
  6148. biometricDataOid OBJECT IDENTIFIER }
  6149. PredefinedBiometricType ::= INTEGER {
  6150. picture(0),handwritten-signature(1)}
  6151. (picture|handwritten-signature)
  6152. </pre>
  6153. </member>
  6154. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ReasonFlags">
  6155. The ReasonFlags object.
  6156. <pre>
  6157. ReasonFlags ::= BIT STRING {
  6158. unused(0),
  6159. keyCompromise(1),
  6160. cACompromise(2),
  6161. affiliationChanged(3),
  6162. superseded(4),
  6163. cessationOfOperation(5),
  6164. certficateHold(6)
  6165. }
  6166. </pre>
  6167. </member>
  6168. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.ReasonFlags.#ctor(System.Int32)">
  6169. @param reasons - the bitwise OR of the Key Reason flags giving the
  6170. allowed uses for the key.
  6171. </member>
  6172. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RoleSyntax">
  6173. Implementation of the RoleSyntax object as specified by the RFC3281.
  6174. <pre>
  6175. RoleSyntax ::= SEQUENCE {
  6176. roleAuthority [0] GeneralNames OPTIONAL,
  6177. roleName [1] GeneralName
  6178. }
  6179. </pre>
  6180. </member>
  6181. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RoleSyntax.GetInstance(System.Object)">
  6182. RoleSyntax factory method.
  6183. @param obj the object used to construct an instance of <code>
  6184. RoleSyntax</code>. It must be an instance of <code>RoleSyntax
  6185. </code> or <code>Asn1Sequence</code>.
  6186. @return the instance of <code>RoleSyntax</code> built from the
  6187. supplied object.
  6188. @throws java.lang.ArgumentException if the object passed
  6189. to the factory is not an instance of <code>RoleSyntax</code> or
  6190. <code>Asn1Sequence</code>.
  6191. </member>
  6192. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RoleSyntax.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralNames,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  6193. Constructor.
  6194. @param roleAuthority the role authority of this RoleSyntax.
  6195. @param roleName the role name of this RoleSyntax.
  6196. </member>
  6197. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RoleSyntax.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  6198. Constructor. Invoking this constructor is the same as invoking
  6199. <code>new RoleSyntax(null, roleName)</code>.
  6200. @param roleName the role name of this RoleSyntax.
  6201. </member>
  6202. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RoleSyntax.#ctor(System.String)">
  6203. Utility constructor. Takes a <code>string</code> argument representing
  6204. the role name, builds a <code>GeneralName</code> to hold the role name
  6205. and calls the constructor that takes a <code>GeneralName</code>.
  6206. @param roleName
  6207. </member>
  6208. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RoleSyntax.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  6209. Constructor that builds an instance of <code>RoleSyntax</code> by
  6210. extracting the encoded elements from the <code>Asn1Sequence</code>
  6211. object supplied.
  6212. @param seq an instance of <code>Asn1Sequence</code> that holds
  6213. the encoded elements used to build this <code>RoleSyntax</code>.
  6214. </member>
  6215. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RoleSyntax.RoleAuthority">
  6216. Gets the role authority of this RoleSyntax.
  6217. @return an instance of <code>GeneralNames</code> holding the
  6218. role authority of this RoleSyntax.
  6219. </member>
  6220. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RoleSyntax.RoleName">
  6221. Gets the role name of this RoleSyntax.
  6222. @return an instance of <code>GeneralName</code> holding the
  6223. role name of this RoleSyntax.
  6224. </member>
  6225. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RoleSyntax.GetRoleNameAsString">
  6226. Gets the role name as a <code>java.lang.string</code> object.
  6227. @return the role name of this RoleSyntax represented as a
  6228. <code>string</code> object.
  6229. </member>
  6230. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RoleSyntax.GetRoleAuthorityAsString">
  6231. Gets the role authority as a <code>string[]</code> object.
  6232. @return the role authority of this RoleSyntax represented as a
  6233. <code>string[]</code> array.
  6234. </member>
  6235. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RoleSyntax.ToAsn1Object">
  6236. Implementation of the method <code>ToAsn1Object</code> as
  6237. required by the superclass <code>ASN1Encodable</code>.
  6238. <pre>
  6239. RoleSyntax ::= SEQUENCE {
  6240. roleAuthority [0] GeneralNames OPTIONAL,
  6241. roleName [1] GeneralName
  6242. }
  6243. </pre>
  6244. </member>
  6245. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.RsaPublicKeyStructure.ToAsn1Object">
  6246. This outputs the key in Pkcs1v2 format.
  6247. <pre>
  6248. RSAPublicKey ::= Sequence {
  6249. modulus Integer, -- n
  6250. publicExponent Integer, -- e
  6251. }
  6252. </pre>
  6253. </member>
  6254. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym">
  6255. Structure for a name or pseudonym.
  6256. <pre>
  6257. NameOrPseudonym ::= CHOICE {
  6258. surAndGivenName SEQUENCE {
  6259. surName DirectoryString,
  6260. givenName SEQUENCE OF DirectoryString
  6261. },
  6262. pseudonym DirectoryString
  6263. }
  6264. </pre>
  6265. @see org.bouncycastle.asn1.x509.sigi.PersonalData
  6266. </member>
  6267. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.DirectoryString)">
  6268. Constructor from DERString.
  6269. <p/>
  6270. The sequence is of type NameOrPseudonym:
  6271. <p/>
  6272. <pre>
  6273. NameOrPseudonym ::= CHOICE {
  6274. surAndGivenName SEQUENCE {
  6275. surName DirectoryString,
  6276. givenName SEQUENCE OF DirectoryString
  6277. },
  6278. pseudonym DirectoryString
  6279. }
  6280. </pre>
  6281. @param pseudonym pseudonym value to use.
  6282. </member>
  6283. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  6284. Constructor from Asn1Sequence.
  6285. <p/>
  6286. The sequence is of type NameOrPseudonym:
  6287. <p/>
  6288. <pre>
  6289. NameOrPseudonym ::= CHOICE {
  6290. surAndGivenName SEQUENCE {
  6291. surName DirectoryString,
  6292. givenName SEQUENCE OF DirectoryString
  6293. },
  6294. pseudonym DirectoryString
  6295. }
  6296. </pre>
  6297. @param seq The ASN.1 sequence.
  6298. </member>
  6299. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym.#ctor(System.String)">
  6300. Constructor from a given details.
  6301. @param pseudonym The pseudonym.
  6302. </member>
  6303. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.DirectoryString,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  6304. Constructor from a given details.
  6305. @param surname The surname.
  6306. @param givenName A sequence of directory strings making up the givenName
  6307. </member>
  6308. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym.ToAsn1Object">
  6309. Produce an object suitable for an Asn1OutputStream.
  6310. <p/>
  6311. Returns:
  6312. <p/>
  6313. <pre>
  6314. NameOrPseudonym ::= CHOICE {
  6315. surAndGivenName SEQUENCE {
  6316. surName DirectoryString,
  6317. givenName SEQUENCE OF DirectoryString
  6318. },
  6319. pseudonym DirectoryString
  6320. }
  6321. </pre>
  6322. @return an Asn1Object
  6323. </member>
  6324. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.PersonalData">
  6325. Contains personal data for the otherName field in the subjectAltNames
  6326. extension.
  6327. <p/>
  6328. <pre>
  6329. PersonalData ::= SEQUENCE {
  6330. nameOrPseudonym NameOrPseudonym,
  6331. nameDistinguisher [0] INTEGER OPTIONAL,
  6332. dateOfBirth [1] GeneralizedTime OPTIONAL,
  6333. placeOfBirth [2] DirectoryString OPTIONAL,
  6334. gender [3] PrintableString OPTIONAL,
  6335. postalAddress [4] DirectoryString OPTIONAL
  6336. }
  6337. </pre>
  6338. @see org.bouncycastle.asn1.x509.sigi.NameOrPseudonym
  6339. @see org.bouncycastle.asn1.x509.sigi.SigIObjectIdentifiers
  6340. </member>
  6341. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.PersonalData.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  6342. Constructor from Asn1Sequence.
  6343. <p/>
  6344. The sequence is of type NameOrPseudonym:
  6345. <p/>
  6346. <pre>
  6347. PersonalData ::= SEQUENCE {
  6348. nameOrPseudonym NameOrPseudonym,
  6349. nameDistinguisher [0] INTEGER OPTIONAL,
  6350. dateOfBirth [1] GeneralizedTime OPTIONAL,
  6351. placeOfBirth [2] DirectoryString OPTIONAL,
  6352. gender [3] PrintableString OPTIONAL,
  6353. postalAddress [4] DirectoryString OPTIONAL
  6354. }
  6355. </pre>
  6356. @param seq The ASN.1 sequence.
  6357. </member>
  6358. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.PersonalData.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1GeneralizedTime,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.DirectoryString,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.DirectoryString)">
  6359. Constructor from a given details.
  6360. @param nameOrPseudonym Name or pseudonym.
  6361. @param nameDistinguisher Name distinguisher.
  6362. @param dateOfBirth Date of birth.
  6363. @param placeOfBirth Place of birth.
  6364. @param gender Gender.
  6365. @param postalAddress Postal Address.
  6366. </member>
  6367. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.PersonalData.ToAsn1Object">
  6368. Produce an object suitable for an Asn1OutputStream.
  6369. <p/>
  6370. Returns:
  6371. <p/>
  6372. <pre>
  6373. PersonalData ::= SEQUENCE {
  6374. nameOrPseudonym NameOrPseudonym,
  6375. nameDistinguisher [0] INTEGER OPTIONAL,
  6376. dateOfBirth [1] GeneralizedTime OPTIONAL,
  6377. placeOfBirth [2] DirectoryString OPTIONAL,
  6378. gender [3] PrintableString OPTIONAL,
  6379. postalAddress [4] DirectoryString OPTIONAL
  6380. }
  6381. </pre>
  6382. @return an Asn1Object
  6383. </member>
  6384. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers">
  6385. Object Identifiers of SigI specifciation (German Signature Law
  6386. Interoperability specification).
  6387. </member>
  6388. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigIKP">
  6389. Key purpose IDs for German SigI (Signature Interoperability
  6390. Specification)
  6391. </member>
  6392. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigICP">
  6393. Certificate policy IDs for German SigI (Signature Interoperability
  6394. Specification)
  6395. </member>
  6396. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigION">
  6397. Other Name IDs for German SigI (Signature Interoperability Specification)
  6398. </member>
  6399. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigIKPDirectoryService">
  6400. To be used for for the generation of directory service certificates.
  6401. </member>
  6402. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigIONPersonalData">
  6403. ID for PersonalData
  6404. </member>
  6405. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigICPSigConform">
  6406. Certificate is conform to german signature law.
  6407. </member>
  6408. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes">
  6409. This extension may contain further X.500 attributes of the subject. See also
  6410. RFC 3039.
  6411. <pre>
  6412. SubjectDirectoryAttributes ::= Attributes
  6413. Attributes ::= SEQUENCE SIZE (1..MAX) OF Attribute
  6414. Attribute ::= SEQUENCE
  6415. {
  6416. type AttributeType
  6417. values SET OF AttributeValue
  6418. }
  6419. AttributeType ::= OBJECT IDENTIFIER
  6420. AttributeValue ::= ANY DEFINED BY AttributeType
  6421. </pre>
  6422. @see org.bouncycastle.asn1.x509.X509Name for AttributeType ObjectIdentifiers.
  6423. </member>
  6424. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  6425. Constructor from Asn1Sequence.
  6426. The sequence is of type SubjectDirectoryAttributes:
  6427. <pre>
  6428. SubjectDirectoryAttributes ::= Attributes
  6429. Attributes ::= SEQUENCE SIZE (1..MAX) OF Attribute
  6430. Attribute ::= SEQUENCE
  6431. {
  6432. type AttributeType
  6433. values SET OF AttributeValue
  6434. }
  6435. AttributeType ::= OBJECT IDENTIFIER
  6436. AttributeValue ::= ANY DEFINED BY AttributeType
  6437. </pre>
  6438. @param seq
  6439. The ASN.1 sequence.
  6440. </member>
  6441. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AttributeX509})">
  6442. Constructor from an ArrayList of attributes.
  6443. The ArrayList consists of attributes of type {@link Attribute Attribute}
  6444. @param attributes The attributes.
  6445. </member>
  6446. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes.ToAsn1Object">
  6447. Produce an object suitable for an Asn1OutputStream.
  6448. Returns:
  6449. <pre>
  6450. SubjectDirectoryAttributes ::= Attributes
  6451. Attributes ::= SEQUENCE SIZE (1..MAX) OF Attribute
  6452. Attribute ::= SEQUENCE
  6453. {
  6454. type AttributeType
  6455. values SET OF AttributeValue
  6456. }
  6457. AttributeType ::= OBJECT IDENTIFIER
  6458. AttributeValue ::= ANY DEFINED BY AttributeType
  6459. </pre>
  6460. @return a DERObject
  6461. </member>
  6462. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes.Attributes">
  6463. @return Returns the attributes.
  6464. </member>
  6465. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectKeyIdentifier">
  6466. The SubjectKeyIdentifier object.
  6467. <pre>
  6468. SubjectKeyIdentifier::= OCTET STRING
  6469. </pre>
  6470. </member>
  6471. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectKeyIdentifier.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  6472. Calculates the keyIdentifier using a SHA1 hash over the BIT STRING
  6473. from SubjectPublicKeyInfo as defined in RFC3280.
  6474. @param spki the subject public key info.
  6475. </member>
  6476. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectKeyIdentifier.CreateSha1KeyIdentifier(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  6477. Return a RFC 3280 type 1 key identifier. As in:
  6478. <pre>
  6479. (1) The keyIdentifier is composed of the 160-bit SHA-1 hash of the
  6480. value of the BIT STRING subjectPublicKey (excluding the tag,
  6481. length, and number of unused bits).
  6482. </pre>
  6483. @param keyInfo the key info object containing the subjectPublicKey field.
  6484. @return the key identifier.
  6485. </member>
  6486. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectKeyIdentifier.CreateTruncatedSha1KeyIdentifier(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  6487. Return a RFC 3280 type 2 key identifier. As in:
  6488. <pre>
  6489. (2) The keyIdentifier is composed of a four bit type field with
  6490. the value 0100 followed by the least significant 60 bits of the
  6491. SHA-1 hash of the value of the BIT STRING subjectPublicKey.
  6492. </pre>
  6493. @param keyInfo the key info object containing the subjectPublicKey field.
  6494. @return the key identifier.
  6495. </member>
  6496. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo">
  6497. The object that contains the public key stored in a certficate.
  6498. <p>
  6499. The GetEncoded() method in the public keys in the JCE produces a DER
  6500. encoded one of these.</p>
  6501. </member>
  6502. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo.ParsePublicKey">
  6503. for when the public key is an encoded object - if the bitstring
  6504. can't be decoded this routine raises an IOException.
  6505. @exception IOException - if the bit string doesn't represent a Der
  6506. encoded object.
  6507. </member>
  6508. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo.PublicKeyData">
  6509. for when the public key is raw bits...
  6510. </member>
  6511. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo.ToAsn1Object">
  6512. Produce an object suitable for an Asn1OutputStream.
  6513. <pre>
  6514. SubjectPublicKeyInfo ::= Sequence {
  6515. algorithm AlgorithmIdentifier,
  6516. publicKey BIT STRING }
  6517. </pre>
  6518. </member>
  6519. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Target">
  6520. Target structure used in target information extension for attribute
  6521. certificates from RFC 3281.
  6522. <pre>
  6523. Target ::= CHOICE {
  6524. targetName [0] GeneralName,
  6525. targetGroup [1] GeneralName,
  6526. targetCert [2] TargetCert
  6527. }
  6528. </pre>
  6529. <p>
  6530. The targetCert field is currently not supported and must not be used
  6531. according to RFC 3281.</p>
  6532. </member>
  6533. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Target.GetInstance(System.Object)">
  6534. Creates an instance of a Target from the given object.
  6535. <p>
  6536. <code>obj</code> can be a Target or a {@link Asn1TaggedObject}</p>
  6537. @param obj The object.
  6538. @return A Target instance.
  6539. @throws ArgumentException if the given object cannot be
  6540. interpreted as Target.
  6541. </member>
  6542. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Target.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject)">
  6543. Constructor from Asn1TaggedObject.
  6544. @param tagObj The tagged object.
  6545. @throws ArgumentException if the encoding is wrong.
  6546. </member>
  6547. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Target.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Target.Choice,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  6548. Constructor from given details.
  6549. <p>
  6550. Exactly one of the parameters must be not <code>null</code>.</p>
  6551. @param type the choice type to apply to the name.
  6552. @param name the general name.
  6553. @throws ArgumentException if type is invalid.
  6554. </member>
  6555. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Target.TargetGroup">
  6556. @return Returns the targetGroup.
  6557. </member>
  6558. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Target.TargetName">
  6559. @return Returns the targetName.
  6560. </member>
  6561. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Target.ToAsn1Object">
  6562. Produce an object suitable for an Asn1OutputStream.
  6563. Returns:
  6564. <pre>
  6565. Target ::= CHOICE {
  6566. targetName [0] GeneralName,
  6567. targetGroup [1] GeneralName,
  6568. targetCert [2] TargetCert
  6569. }
  6570. </pre>
  6571. @return an Asn1Object
  6572. </member>
  6573. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.TargetInformation">
  6574. Target information extension for attributes certificates according to RFC
  6575. 3281.
  6576. <pre>
  6577. SEQUENCE OF Targets
  6578. </pre>
  6579. </member>
  6580. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.TargetInformation.GetInstance(System.Object)">
  6581. Creates an instance of a TargetInformation from the given object.
  6582. <p>
  6583. <code>obj</code> can be a TargetInformation or a {@link Asn1Sequence}</p>
  6584. @param obj The object.
  6585. @return A TargetInformation instance.
  6586. @throws ArgumentException if the given object cannot be interpreted as TargetInformation.
  6587. </member>
  6588. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.TargetInformation.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  6589. Constructor from a Asn1Sequence.
  6590. @param seq The Asn1Sequence.
  6591. @throws ArgumentException if the sequence does not contain
  6592. correctly encoded Targets elements.
  6593. </member>
  6594. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.TargetInformation.GetTargetsObjects">
  6595. Returns the targets in this target information extension.
  6596. <p>
  6597. The ArrayList is cloned before it is returned.</p>
  6598. @return Returns the targets.
  6599. </member>
  6600. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.TargetInformation.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Targets)">
  6601. Constructs a target information from a single targets element.
  6602. According to RFC 3281 only one targets element must be produced.
  6603. @param targets A Targets instance.
  6604. </member>
  6605. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.TargetInformation.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Target[])">
  6606. According to RFC 3281 only one targets element must be produced. If
  6607. multiple targets are given they must be merged in
  6608. into one targets element.
  6609. @param targets An array with {@link Targets}.
  6610. </member>
  6611. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.TargetInformation.ToAsn1Object">
  6612. Produce an object suitable for an Asn1OutputStream.
  6613. Returns:
  6614. <pre>
  6615. SEQUENCE OF Targets
  6616. </pre>
  6617. <p>
  6618. According to RFC 3281 only one targets element must be produced. If
  6619. multiple targets are given in the constructor they are merged into one
  6620. targets element. If this was produced from a
  6621. {@link Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence} the encoding is kept.</p>
  6622. @return an Asn1Object
  6623. </member>
  6624. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Targets">
  6625. Targets structure used in target information extension for attribute
  6626. certificates from RFC 3281.
  6627. <pre>
  6628. Targets ::= SEQUENCE OF Target
  6629. Target ::= CHOICE {
  6630. targetName [0] GeneralName,
  6631. targetGroup [1] GeneralName,
  6632. targetCert [2] TargetCert
  6633. }
  6634. TargetCert ::= SEQUENCE {
  6635. targetCertificate IssuerSerial,
  6636. targetName GeneralName OPTIONAL,
  6637. certDigestInfo ObjectDigestInfo OPTIONAL
  6638. }
  6639. </pre>
  6640. @see org.bouncycastle.asn1.x509.Target
  6641. @see org.bouncycastle.asn1.x509.TargetInformation
  6642. </member>
  6643. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Targets.GetInstance(System.Object)">
  6644. Creates an instance of a Targets from the given object.
  6645. <p>
  6646. <code>obj</code> can be a Targets or a {@link Asn1Sequence}</p>
  6647. @param obj The object.
  6648. @return A Targets instance.
  6649. @throws ArgumentException if the given object cannot be interpreted as Target.
  6650. </member>
  6651. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Targets.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  6652. Constructor from Asn1Sequence.
  6653. @param targets The ASN.1 SEQUENCE.
  6654. @throws ArgumentException if the contents of the sequence are
  6655. invalid.
  6656. </member>
  6657. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Targets.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Target[])">
  6658. Constructor from given targets.
  6659. <p>
  6660. The ArrayList is copied.</p>
  6661. @param targets An <code>ArrayList</code> of {@link Target}s.
  6662. @see Target
  6663. @throws ArgumentException if the ArrayList contains not only Targets.
  6664. </member>
  6665. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Targets.GetTargets">
  6666. Returns the targets in an <code>ArrayList</code>.
  6667. <p>
  6668. The ArrayList is cloned before it is returned.</p>
  6669. @return Returns the targets.
  6670. </member>
  6671. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Targets.ToAsn1Object">
  6672. Produce an object suitable for an Asn1OutputStream.
  6673. Returns:
  6674. <pre>
  6675. Targets ::= SEQUENCE OF Target
  6676. </pre>
  6677. @return an Asn1Object
  6678. </member>
  6679. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.TbsCertificateStructure">
  6680. The TbsCertificate object.
  6681. <pre>
  6682. TbsCertificate ::= Sequence {
  6683. version [ 0 ] Version DEFAULT v1(0),
  6684. serialNumber CertificateSerialNumber,
  6685. signature AlgorithmIdentifier,
  6686. issuer Name,
  6687. validity Validity,
  6688. subject Name,
  6689. subjectPublicKeyInfo SubjectPublicKeyInfo,
  6690. issuerUniqueID [ 1 ] IMPLICIT UniqueIdentifier OPTIONAL,
  6691. subjectUniqueID [ 2 ] IMPLICIT UniqueIdentifier OPTIONAL,
  6692. extensions [ 3 ] Extensions OPTIONAL
  6693. }
  6694. </pre>
  6695. <p>
  6696. Note: issuerUniqueID and subjectUniqueID are both deprecated by the IETF. This class
  6697. will parse them, but you really shouldn't be creating new ones.</p>
  6698. </member>
  6699. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.TbsCertificateList">
  6700. PKIX RFC-2459 - TbsCertList object.
  6701. <pre>
  6702. TbsCertList ::= Sequence {
  6703. version Version OPTIONAL,
  6704. -- if present, shall be v2
  6705. signature AlgorithmIdentifier,
  6706. issuer Name,
  6707. thisUpdate Time,
  6708. nextUpdate Time OPTIONAL,
  6709. revokedCertificates Sequence OF Sequence {
  6710. userCertificate CertificateSerialNumber,
  6711. revocationDate Time,
  6712. crlEntryExtensions Extensions OPTIONAL
  6713. -- if present, shall be v2
  6714. } OPTIONAL,
  6715. crlExtensions [0] EXPLICIT Extensions OPTIONAL
  6716. -- if present, shall be v2
  6717. }
  6718. </pre>
  6719. </member>
  6720. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Time.#ctor(System.DateTime)">
  6721. creates a time object from a given date - if the date is between 1950
  6722. and 2049 a UTCTime object is Generated, otherwise a GeneralizedTime
  6723. is used.
  6724. </member>
  6725. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Time.ToDateTime">
  6726. <summary>
  6727. Return our time as DateTime.
  6728. </summary>
  6729. <returns>A date time.</returns>
  6730. </member>
  6731. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Time.ToAsn1Object">
  6732. Produce an object suitable for an Asn1OutputStream.
  6733. <pre>
  6734. Time ::= CHOICE {
  6735. utcTime UTCTime,
  6736. generalTime GeneralizedTime }
  6737. </pre>
  6738. </member>
  6739. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.UserNotice">
  6740. <code>UserNotice</code> class, used in
  6741. <code>CertificatePolicies</code> X509 extensions (in policy
  6742. qualifiers).
  6743. <pre>
  6744. UserNotice ::= Sequence {
  6745. noticeRef NoticeReference OPTIONAL,
  6746. explicitText DisplayText OPTIONAL}
  6747. </pre>
  6748. @see PolicyQualifierId
  6749. @see PolicyInformation
  6750. </member>
  6751. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.UserNotice.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.NoticeReference,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DisplayText)">
  6752. Creates a new <code>UserNotice</code> instance.
  6753. @param noticeRef a <code>NoticeReference</code> value
  6754. @param explicitText a <code>DisplayText</code> value
  6755. </member>
  6756. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.UserNotice.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.NoticeReference,System.String)">
  6757. Creates a new <code>UserNotice</code> instance.
  6758. @param noticeRef a <code>NoticeReference</code> value
  6759. @param str the explicitText field as a string.
  6760. </member>
  6761. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.V1TbsCertificateGenerator">
  6762. Generator for Version 1 TbsCertificateStructures.
  6763. <pre>
  6764. TbsCertificate ::= Sequence {
  6765. version [ 0 ] Version DEFAULT v1(0),
  6766. serialNumber CertificateSerialNumber,
  6767. signature AlgorithmIdentifier,
  6768. issuer Name,
  6769. validity Validity,
  6770. subject Name,
  6771. subjectPublicKeyInfo SubjectPublicKeyInfo,
  6772. }
  6773. </pre>
  6774. </member>
  6775. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.V2AttributeCertificateInfoGenerator">
  6776. Generator for Version 2 AttributeCertificateInfo
  6777. <pre>
  6778. AttributeCertificateInfo ::= Sequence {
  6779. version AttCertVersion -- version is v2,
  6780. holder Holder,
  6781. issuer AttCertIssuer,
  6782. signature AlgorithmIdentifier,
  6783. serialNumber CertificateSerialNumber,
  6784. attrCertValidityPeriod AttCertValidityPeriod,
  6785. attributes Sequence OF Attr,
  6786. issuerUniqueID UniqueIdentifier OPTIONAL,
  6787. extensions Extensions OPTIONAL
  6788. }
  6789. </pre>
  6790. </member>
  6791. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.V2AttributeCertificateInfoGenerator.AddAttribute(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AttributeX509)">
  6792. @param attribute
  6793. </member>
  6794. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.V2Form.ToAsn1Object">
  6795. Produce an object suitable for an Asn1OutputStream.
  6796. <pre>
  6797. V2Form ::= Sequence {
  6798. issuerName GeneralNames OPTIONAL,
  6799. baseCertificateID [0] IssuerSerial OPTIONAL,
  6800. objectDigestInfo [1] ObjectDigestInfo OPTIONAL
  6801. -- issuerName MUST be present in this profile
  6802. -- baseCertificateID and objectDigestInfo MUST NOT
  6803. -- be present in this profile
  6804. }
  6805. </pre>
  6806. </member>
  6807. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.V2TbsCertListGenerator">
  6808. Generator for Version 2 TbsCertList structures.
  6809. <pre>
  6810. TbsCertList ::= Sequence {
  6811. version Version OPTIONAL,
  6812. -- if present, shall be v2
  6813. signature AlgorithmIdentifier,
  6814. issuer Name,
  6815. thisUpdate Time,
  6816. nextUpdate Time OPTIONAL,
  6817. revokedCertificates Sequence OF Sequence {
  6818. userCertificate CertificateSerialNumber,
  6819. revocationDate Time,
  6820. crlEntryExtensions Extensions OPTIONAL
  6821. -- if present, shall be v2
  6822. } OPTIONAL,
  6823. crlExtensions [0] EXPLICIT Extensions OPTIONAL
  6824. -- if present, shall be v2
  6825. }
  6826. </pre>
  6827. <b>Note: This class may be subject to change</b>
  6828. </member>
  6829. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.V3TbsCertificateGenerator">
  6830. Generator for Version 3 TbsCertificateStructures.
  6831. <pre>
  6832. TbsCertificate ::= Sequence {
  6833. version [ 0 ] Version DEFAULT v1(0),
  6834. serialNumber CertificateSerialNumber,
  6835. signature AlgorithmIdentifier,
  6836. issuer Name,
  6837. validity Validity,
  6838. subject Name,
  6839. subjectPublicKeyInfo SubjectPublicKeyInfo,
  6840. issuerUniqueID [ 1 ] IMPLICIT UniqueIdentifier OPTIONAL,
  6841. subjectUniqueID [ 2 ] IMPLICIT UniqueIdentifier OPTIONAL,
  6842. extensions [ 3 ] Extensions OPTIONAL
  6843. }
  6844. </pre>
  6845. </member>
  6846. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509CertificateStructure">
  6847. an X509Certificate structure.
  6848. <pre>
  6849. Certificate ::= Sequence {
  6850. tbsCertificate TbsCertificate,
  6851. signatureAlgorithm AlgorithmIdentifier,
  6852. signature BIT STRING
  6853. }
  6854. </pre>
  6855. </member>
  6856. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509DefaultEntryConverter">
  6857. The default converter for X509 DN entries when going from their
  6858. string value to ASN.1 strings.
  6859. </member>
  6860. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509DefaultEntryConverter.GetConvertedValue(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.String)">
  6861. Apply default conversion for the given value depending on the oid
  6862. and the character range of the value.
  6863. @param oid the object identifier for the DN entry
  6864. @param value the value associated with it
  6865. @return the ASN.1 equivalent for the string value.
  6866. </member>
  6867. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extension">
  6868. an object for the elements in the X.509 V3 extension block.
  6869. </member>
  6870. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extension.ConvertValueToObject(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extension)">
  6871. <sumary>Convert the value of the passed in extension to an object.</sumary>
  6872. <param name="ext">The extension to parse.</param>
  6873. <returns>The object the value string contains.</returns>
  6874. <exception cref="T:System.ArgumentException">If conversion is not possible.</exception>
  6875. </member>
  6876. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.SubjectDirectoryAttributes">
  6877. Subject Directory Attributes
  6878. </member>
  6879. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.SubjectKeyIdentifier">
  6880. Subject Key Identifier
  6881. </member>
  6882. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.KeyUsage">
  6883. Key Usage
  6884. </member>
  6885. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.PrivateKeyUsagePeriod">
  6886. Private Key Usage Period
  6887. </member>
  6888. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.SubjectAlternativeName">
  6889. Subject Alternative Name
  6890. </member>
  6891. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.IssuerAlternativeName">
  6892. Issuer Alternative Name
  6893. </member>
  6894. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.BasicConstraints">
  6895. Basic Constraints
  6896. </member>
  6897. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.CrlNumber">
  6898. CRL Number
  6899. </member>
  6900. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.ReasonCode">
  6901. Reason code
  6902. </member>
  6903. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.InstructionCode">
  6904. Hold Instruction Code
  6905. </member>
  6906. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.InvalidityDate">
  6907. Invalidity Date
  6908. </member>
  6909. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.DeltaCrlIndicator">
  6910. Delta CRL indicator
  6911. </member>
  6912. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.IssuingDistributionPoint">
  6913. Issuing Distribution Point
  6914. </member>
  6915. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.CertificateIssuer">
  6916. Certificate Issuer
  6917. </member>
  6918. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.NameConstraints">
  6919. Name Constraints
  6920. </member>
  6921. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.CrlDistributionPoints">
  6922. CRL Distribution Points
  6923. </member>
  6924. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.CertificatePolicies">
  6925. Certificate Policies
  6926. </member>
  6927. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.PolicyMappings">
  6928. Policy Mappings
  6929. </member>
  6930. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.AuthorityKeyIdentifier">
  6931. Authority Key Identifier
  6932. </member>
  6933. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.PolicyConstraints">
  6934. Policy Constraints
  6935. </member>
  6936. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.ExtendedKeyUsage">
  6937. Extended Key Usage
  6938. </member>
  6939. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.FreshestCrl">
  6940. Freshest CRL
  6941. </member>
  6942. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.InhibitAnyPolicy">
  6943. Inhibit Any Policy
  6944. </member>
  6945. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.AuthorityInfoAccess">
  6946. Authority Info Access
  6947. </member>
  6948. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.SubjectInfoAccess">
  6949. Subject Info Access
  6950. </member>
  6951. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.LogoType">
  6952. Logo Type
  6953. </member>
  6954. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.BiometricInfo">
  6955. BiometricInfo
  6956. </member>
  6957. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.QCStatements">
  6958. QCStatements
  6959. </member>
  6960. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.AuditIdentity">
  6961. Audit identity extension in attribute certificates.
  6962. </member>
  6963. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.NoRevAvail">
  6964. NoRevAvail extension in attribute certificates.
  6965. </member>
  6966. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.TargetInformation">
  6967. TargetInformation extension in attribute certificates.
  6968. </member>
  6969. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.ExpiredCertsOnCrl">
  6970. Expired Certificates on CRL extension
  6971. </member>
  6972. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  6973. Constructor from Asn1Sequence.
  6974. the extensions are a list of constructed sequences, either with (Oid, OctetString) or (Oid, Boolean, OctetString)
  6975. </member>
  6976. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.#ctor(System.Collections.Generic.IDictionary{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extension})">
  6977. constructor from a table of extensions.
  6978. <p>
  6979. it's is assumed the table contains Oid/string pairs.</p>
  6980. </member>
  6981. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier},System.Collections.Generic.IDictionary{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extension})">
  6982. Constructor from a table of extensions with ordering.
  6983. <p>
  6984. It's is assumed the table contains Oid/string pairs.</p>
  6985. </member>
  6986. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extension})">
  6987. Constructor from two vectors
  6988. @param objectIDs an ArrayList of the object identifiers.
  6989. @param values an ArrayList of the extension values.
  6990. </member>
  6991. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.ExtensionOids">
  6992. return an Enumeration of the extension field's object ids.
  6993. </member>
  6994. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.GetExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  6995. return the extension represented by the object identifier
  6996. passed in.
  6997. @return the extension if it's present, null otherwise.
  6998. </member>
  6999. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.GetExtensionParsedValue(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  7000. return the parsed value of the extension represented by the object identifier
  7001. passed in.
  7002. @return the parsed value of the extension if it's present, null otherwise.
  7003. </member>
  7004. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions.ToAsn1Object">
  7005. <pre>
  7006. Extensions ::= SEQUENCE SIZE (1..MAX) OF Extension
  7007. Extension ::= SEQUENCE {
  7008. extnId EXTENSION.&amp;id ({ExtensionSet}),
  7009. critical BOOLEAN DEFAULT FALSE,
  7010. extnValue OCTET STRING }
  7011. </pre>
  7012. </member>
  7013. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator">
  7014. <remarks>Generator for X.509 extensions</remarks>
  7015. </member>
  7016. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator.Reset">
  7017. <summary>Reset the generator</summary>
  7018. </member>
  7019. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator.AddExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  7020. <summary>
  7021. Add an extension with the given oid and the passed in value to be included
  7022. in the OCTET STRING associated with the extension.
  7023. </summary>
  7024. <param name="oid">OID for the extension.</param>
  7025. <param name="critical">True if critical, false otherwise.</param>
  7026. <param name="extValue">The ASN.1 object to be included in the extension.</param>
  7027. </member>
  7028. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator.AddExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,System.Byte[])">
  7029. <summary>
  7030. Add an extension with the given oid and the passed in byte array to be wrapped
  7031. in the OCTET STRING associated with the extension.
  7032. </summary>
  7033. <param name="oid">OID for the extension.</param>
  7034. <param name="critical">True if critical, false otherwise.</param>
  7035. <param name="extValue">The byte array to be wrapped.</param>
  7036. </member>
  7037. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator.IsEmpty">
  7038. <summary>Return true if there are no extension present in this generator.</summary>
  7039. <returns>True if empty, false otherwise</returns>
  7040. </member>
  7041. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator.Generate">
  7042. <summary>Generate an X509Extensions object based on the current state of the generator.</summary>
  7043. <returns>An <c>X509Extensions</c> object</returns>
  7044. </member>
  7045. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name">
  7046. <pre>
  7047. RDNSequence ::= SEQUENCE OF RelativeDistinguishedName
  7048. RelativeDistinguishedName ::= SET SIZE (1..MAX) OF AttributeTypeAndValue
  7049. AttributeTypeAndValue ::= SEQUENCE {
  7050. type OBJECT IDENTIFIER,
  7051. value ANY }
  7052. </pre>
  7053. </member>
  7054. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.C">
  7055. country code - StringType(SIZE(2))
  7056. </member>
  7057. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.O">
  7058. organization - StringType(SIZE(1..64))
  7059. </member>
  7060. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.OU">
  7061. organizational unit name - StringType(SIZE(1..64))
  7062. </member>
  7063. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.T">
  7064. Title
  7065. </member>
  7066. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.CN">
  7067. common name - StringType(SIZE(1..64))
  7068. </member>
  7069. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.Street">
  7070. street - StringType(SIZE(1..64))
  7071. </member>
  7072. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.SerialNumber">
  7073. device serial number name - StringType(SIZE(1..64))
  7074. </member>
  7075. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.L">
  7076. locality name - StringType(SIZE(1..64))
  7077. </member>
  7078. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.ST">
  7079. state, or province name - StringType(SIZE(1..64))
  7080. </member>
  7081. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.Surname">
  7082. Naming attributes of type X520name
  7083. </member>
  7084. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.BusinessCategory">
  7085. businessCategory - DirectoryString(SIZE(1..128)
  7086. </member>
  7087. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.PostalCode">
  7088. postalCode - DirectoryString(SIZE(1..40)
  7089. </member>
  7090. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.DnQualifier">
  7091. dnQualifier - DirectoryString(SIZE(1..64)
  7092. </member>
  7093. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.Pseudonym">
  7094. RFC 3039 Pseudonym - DirectoryString(SIZE(1..64)
  7095. </member>
  7096. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.DateOfBirth">
  7097. RFC 3039 DateOfBirth - GeneralizedTime - YYYYMMDD000000Z
  7098. </member>
  7099. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.PlaceOfBirth">
  7100. RFC 3039 PlaceOfBirth - DirectoryString(SIZE(1..128)
  7101. </member>
  7102. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.Gender">
  7103. RFC 3039 DateOfBirth - PrintableString (SIZE(1)) -- "M", "F", "m" or "f"
  7104. </member>
  7105. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.CountryOfCitizenship">
  7106. RFC 3039 CountryOfCitizenship - PrintableString (SIZE (2)) -- ISO 3166
  7107. codes only
  7108. </member>
  7109. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.CountryOfResidence">
  7110. RFC 3039 CountryOfCitizenship - PrintableString (SIZE (2)) -- ISO 3166
  7111. codes only
  7112. </member>
  7113. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.NameAtBirth">
  7114. ISIS-MTT NameAtBirth - DirectoryString(SIZE(1..64)
  7115. </member>
  7116. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.PostalAddress">
  7117. RFC 3039 PostalAddress - SEQUENCE SIZE (1..6) OF
  7118. DirectoryString(SIZE(1..30))
  7119. </member>
  7120. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.DmdName">
  7121. RFC 2256 dmdName
  7122. </member>
  7123. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.TelephoneNumber">
  7124. id-at-telephoneNumber
  7125. </member>
  7126. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.OrganizationIdentifier">
  7127. id-at-organizationIdentifier
  7128. </member>
  7129. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.Name">
  7130. id-at-name
  7131. </member>
  7132. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.EmailAddress">
  7133. Email address (RSA PKCS#9 extension) - IA5String.
  7134. <p>Note: if you're trying to be ultra orthodox, don't use this! It shouldn't be in here.</p>
  7135. </member>
  7136. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.UnstructuredName">
  7137. more from PKCS#9
  7138. </member>
  7139. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.E">
  7140. email address in Verisign certificates
  7141. </member>
  7142. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.UID">
  7143. LDAP User id.
  7144. </member>
  7145. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.DefaultReverse">
  7146. determines whether or not strings should be processed and printed
  7147. from back to front.
  7148. </member>
  7149. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.DefaultSymbolsInternal">
  7150. default look up table translating OID values into their common symbols following
  7151. the convention in RFC 2253 with a few extras
  7152. </member>
  7153. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.RFC2253SymbolsInternal">
  7154. look up table translating OID values into their common symbols following the convention in RFC 2253
  7155. </member>
  7156. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.RFC1779SymbolsInternal">
  7157. look up table translating OID values into their common symbols following the convention in RFC 1779
  7158. </member>
  7159. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.DefaultLookupInternal">
  7160. look up table translating common symbols into their OIDS.
  7161. </member>
  7162. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  7163. Return a X509Name based on the passed in tagged object.
  7164. @param obj tag object holding name.
  7165. @param explicitly true if explicitly tagged false otherwise.
  7166. @return the X509Name
  7167. </member>
  7168. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  7169. Constructor from Asn1Sequence
  7170. the principal will be a list of constructed sets, each containing an (OID, string) pair.
  7171. </member>
  7172. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier},System.Collections.Generic.IDictionary{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.String})">
  7173. Constructor from a table of attributes with ordering.
  7174. <p>
  7175. it's is assumed the table contains OID/string pairs, and the contents
  7176. of the table are copied into an internal table as part of the
  7177. construction process. The ordering ArrayList should contain the OIDs
  7178. in the order they are meant to be encoded or printed in ToString.</p>
  7179. </member>
  7180. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier},System.Collections.Generic.IDictionary{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.String},Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509NameEntryConverter)">
  7181. Constructor from a table of attributes with ordering.
  7182. <p>
  7183. it's is assumed the table contains OID/string pairs, and the contents
  7184. of the table are copied into an internal table as part of the
  7185. construction process. The ordering ArrayList should contain the OIDs
  7186. in the order they are meant to be encoded or printed in ToString.</p>
  7187. <p>
  7188. The passed in converter will be used to convert the strings into their
  7189. ASN.1 counterparts.</p>
  7190. </member>
  7191. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier},System.Collections.Generic.IList{System.String})">
  7192. Takes two vectors one of the oids and the other of the values.
  7193. </member>
  7194. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier},System.Collections.Generic.IList{System.String},Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509NameEntryConverter)">
  7195. Takes two vectors one of the oids and the other of the values.
  7196. <p>
  7197. The passed in converter will be used to convert the strings into their
  7198. ASN.1 counterparts.</p>
  7199. </member>
  7200. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.String)">
  7201. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  7202. some such, converting it into an ordered set of name attributes.
  7203. </member>
  7204. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509NameEntryConverter)">
  7205. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  7206. some such, converting it into an ordered set of name attributes with each
  7207. string value being converted to its associated ASN.1 type using the passed
  7208. in converter.
  7209. </member>
  7210. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Boolean,System.String)">
  7211. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  7212. some such, converting it into an ordered set of name attributes. If reverse
  7213. is true, create the encoded version of the sequence starting from the
  7214. last element in the string.
  7215. </member>
  7216. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Boolean,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509NameEntryConverter)">
  7217. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  7218. some such, converting it into an ordered set of name attributes with each
  7219. string value being converted to its associated ASN.1 type using the passed
  7220. in converter. If reverse is true the ASN.1 sequence representing the DN will
  7221. be built by starting at the end of the string, rather than the start.
  7222. </member>
  7223. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Boolean,System.Collections.Generic.IDictionary{System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier},System.String)">
  7224. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  7225. some such, converting it into an ordered set of name attributes. lookUp
  7226. should provide a table of lookups, indexed by lowercase only strings and
  7227. yielding a DerObjectIdentifier, other than that OID. and numeric oids
  7228. will be processed automatically.
  7229. <br/>
  7230. If reverse is true, create the encoded version of the sequence
  7231. starting from the last element in the string.
  7232. @param reverse true if we should start scanning from the end (RFC 2553).
  7233. @param lookUp table of names and their oids.
  7234. @param dirName the X.500 string to be parsed.
  7235. </member>
  7236. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Boolean,System.Collections.Generic.IDictionary{System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier},System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509NameEntryConverter)">
  7237. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  7238. some such, converting it into an ordered set of name attributes. lookUp
  7239. should provide a table of lookups, indexed by lowercase only strings and
  7240. yielding a DerObjectIdentifier, other than that OID. and numeric oids
  7241. will be processed automatically. The passed in converter is used to convert the
  7242. string values to the right of each equals sign to their ASN.1 counterparts.
  7243. <br/>
  7244. @param reverse true if we should start scanning from the end, false otherwise.
  7245. @param lookUp table of names and oids.
  7246. @param dirName the string dirName
  7247. @param converter the converter to convert string values into their ASN.1 equivalents
  7248. </member>
  7249. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.GetOidList">
  7250. return an IList of the oids in the name, in the order they were found.
  7251. </member>
  7252. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.GetValueList">
  7253. return an IList of the values found in the name, in the order they
  7254. were found.
  7255. </member>
  7256. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.GetValueList(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  7257. return an IList of the values found in the name, in the order they
  7258. were found, with the DN label corresponding to passed in oid.
  7259. </member>
  7260. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.Equivalent(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name,System.Boolean)">
  7261. <param name="other">The X509Name object to test equivalency against.</param>
  7262. <param name="inOrder">If true, the order of elements must be the same,
  7263. as well as the values associated with each element.</param>
  7264. </member>
  7265. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.Equivalent(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name)">
  7266. test for equivalence - note: case is ignored.
  7267. </member>
  7268. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name.ToString(System.Boolean,System.Collections.Generic.IDictionary{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.String})">
  7269. convert the structure to a string - if reverse is true the
  7270. oids and values are listed out starting with the last element
  7271. in the sequence (ala RFC 2253), otherwise the string will begin
  7272. with the first element of the structure. If no string definition
  7273. for the oid is found in oidSymbols the string value of the oid is
  7274. added. Two standard symbol tables are provided DefaultSymbols, and
  7275. RFC2253Symbols as part of this class.
  7276. @param reverse if true start at the end of the sequence and work back.
  7277. @param oidSymbols look up table strings for oids.
  7278. </member>
  7279. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509NameEntryConverter">
  7280. * It turns out that the number of standard ways the fields in a DN should be
  7281. * encoded into their ASN.1 counterparts is rapidly approaching the
  7282. * number of machines on the internet. By default the X509Name class
  7283. * will produce UTF8Strings in line with the current recommendations (RFC 3280).
  7284. * <p>
  7285. * An example of an encoder look like below:
  7286. * <pre>
  7287. * public class X509DirEntryConverter
  7288. * : X509NameEntryConverter
  7289. * {
  7290. * public Asn1Object GetConvertedValue(
  7291. * DerObjectIdentifier oid,
  7292. * string value)
  7293. * {
  7294. * if (str.Length() != 0 &amp;&amp; str.charAt(0) == '#')
  7295. * {
  7296. * return ConvertHexEncoded(str, 1);
  7297. * }
  7298. * if (oid.Equals(EmailAddress))
  7299. * {
  7300. * return new DerIA5String(str);
  7301. * }
  7302. * else if (CanBePrintable(str))
  7303. * {
  7304. * return new DerPrintableString(str);
  7305. * }
  7306. * else if (CanBeUTF8(str))
  7307. * {
  7308. * return new DerUtf8String(str);
  7309. * }
  7310. * else
  7311. * {
  7312. * return new DerBmpString(str);
  7313. * }
  7314. * }
  7315. * }
  7316. * </pre>
  7317. * </p>
  7318. </member>
  7319. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509NameEntryConverter.ConvertHexEncoded(System.String,System.Int32)">
  7320. Convert an inline encoded hex string rendition of an ASN.1
  7321. object back into its corresponding ASN.1 object.
  7322. @param str the hex encoded object
  7323. @param off the index at which the encoding starts
  7324. @return the decoded object
  7325. </member>
  7326. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509NameEntryConverter.CanBePrintable(System.String)">
  7327. return true if the passed in string can be represented without
  7328. loss as a PrintableString, false otherwise.
  7329. </member>
  7330. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509NameEntryConverter.GetConvertedValue(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.String)">
  7331. Convert the passed in string value into the appropriate ASN.1
  7332. encoded object.
  7333. @param oid the oid associated with the value in the DN.
  7334. @param value the value of the particular DN component.
  7335. @return the ASN.1 equivalent for the value.
  7336. </member>
  7337. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509NameTokenizer">
  7338. class for breaking up an X500 Name into it's component tokens, ala
  7339. java.util.StringTokenizer. We need this class as some of the
  7340. lightweight Java environment don't support classes like
  7341. StringTokenizer.
  7342. </member>
  7343. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.ECNamedCurveTable">
  7344. <summary>A unified elliptic curve registry of the various standard-specific registries.</summary>
  7345. </member>
  7346. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.ECNamedCurveTable.GetByName(System.String)">
  7347. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given name.</summary>
  7348. <param name="name">The name of the curve.</param>
  7349. </member>
  7350. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.ECNamedCurveTable.GetByNameLazy(System.String)">
  7351. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given name.</summary>
  7352. <remarks>
  7353. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of
  7354. the full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  7355. </remarks>
  7356. <param name="name">The name of the curve.</param>
  7357. </member>
  7358. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.ECNamedCurveTable.GetByOid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  7359. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given
  7360. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  7361. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  7362. </member>
  7363. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.ECNamedCurveTable.GetByOidLazy(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  7364. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given
  7365. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  7366. <remarks>
  7367. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of
  7368. the full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  7369. </remarks>
  7370. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  7371. </member>
  7372. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.ECNamedCurveTable.GetName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  7373. <summary>Look up the name of the curve with the given <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  7374. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  7375. </member>
  7376. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.ECNamedCurveTable.GetOid(System.String)">
  7377. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> of the curve with the given name.</summary>
  7378. <param name="name">The name of the curve.</param>
  7379. </member>
  7380. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.ECNamedCurveTable.Names">
  7381. <summary>Enumerate the available curve names in all the registries.</summary>
  7382. </member>
  7383. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.KeySpecificInfo">
  7384. ASN.1 def for Diffie-Hellman key exchange KeySpecificInfo structure. See
  7385. RFC 2631, or X9.42, for further details.
  7386. </member>
  7387. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.KeySpecificInfo.ToAsn1Object">
  7388. Produce an object suitable for an Asn1OutputStream.
  7389. <pre>
  7390. KeySpecificInfo ::= Sequence {
  7391. algorithm OBJECT IDENTIFIER,
  7392. counter OCTET STRING SIZE (4..4)
  7393. }
  7394. </pre>
  7395. </member>
  7396. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.OtherInfo">
  7397. ANS.1 def for Diffie-Hellman key exchange OtherInfo structure. See
  7398. RFC 2631, or X9.42, for further details.
  7399. </member>
  7400. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.OtherInfo.ToAsn1Object">
  7401. Produce an object suitable for an Asn1OutputStream.
  7402. <pre>
  7403. OtherInfo ::= Sequence {
  7404. keyInfo KeySpecificInfo,
  7405. partyAInfo [0] OCTET STRING OPTIONAL,
  7406. suppPubInfo [2] OCTET STRING
  7407. }
  7408. </pre>
  7409. </member>
  7410. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X962NamedCurves">
  7411. <summary>Elliptic curve registry for the curves defined in X.962 EC-DSA.</summary>
  7412. </member>
  7413. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X962NamedCurves.GetByName(System.String)">
  7414. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given name.</summary>
  7415. <param name="name">The name of the curve.</param>
  7416. </member>
  7417. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X962NamedCurves.GetByNameLazy(System.String)">
  7418. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given name.</summary>
  7419. <remarks>
  7420. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  7421. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  7422. </remarks>
  7423. <param name="name">The name of the curve.</param>
  7424. </member>
  7425. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X962NamedCurves.GetByOid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  7426. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given
  7427. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  7428. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  7429. </member>
  7430. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X962NamedCurves.GetByOidLazy(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  7431. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given
  7432. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  7433. <remarks>
  7434. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  7435. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  7436. </remarks>
  7437. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  7438. </member>
  7439. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X962NamedCurves.GetName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  7440. <summary>Look up the name of the curve with the given <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  7441. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  7442. </member>
  7443. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X962NamedCurves.GetOid(System.String)">
  7444. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> of the curve with the given name.</summary>
  7445. <param name="name">The name of the curve.</param>
  7446. </member>
  7447. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X962NamedCurves.Names">
  7448. <summary>Enumerate the available curve names in this registry.</summary>
  7449. </member>
  7450. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X962Parameters.ToAsn1Object">
  7451. Produce an object suitable for an Asn1OutputStream.
  7452. <pre>
  7453. Parameters ::= CHOICE {
  7454. ecParameters ECParameters,
  7455. namedCurve CURVES.&amp;id({CurveNames}),
  7456. implicitlyCA Null
  7457. }
  7458. </pre>
  7459. </member>
  7460. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9Curve">
  7461. ASN.1 def for Elliptic-Curve Curve structure. See
  7462. X9.62, for further details.
  7463. </member>
  7464. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9Curve.ToAsn1Object">
  7465. Produce an object suitable for an Asn1OutputStream.
  7466. <pre>
  7467. Curve ::= Sequence {
  7468. a FieldElement,
  7469. b FieldElement,
  7470. seed BIT STRING OPTIONAL
  7471. }
  7472. </pre>
  7473. </member>
  7474. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters">
  7475. ASN.1 def for Elliptic-Curve ECParameters structure. See
  7476. X9.62, for further details.
  7477. </member>
  7478. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters.CurveEntry">
  7479. Return the ASN.1 entry representing the Curve.
  7480. @return the X9Curve for the curve in these parameters.
  7481. </member>
  7482. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters.FieldIDEntry">
  7483. Return the ASN.1 entry representing the FieldID.
  7484. @return the X9FieldID for the FieldID in these parameters.
  7485. </member>
  7486. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters.BaseEntry">
  7487. Return the ASN.1 entry representing the base point G.
  7488. @return the X9ECPoint for the base point in these parameters.
  7489. </member>
  7490. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters.ToAsn1Object">
  7491. Produce an object suitable for an Asn1OutputStream.
  7492. <pre>
  7493. ECParameters ::= Sequence {
  7494. version Integer { ecpVer1(1) } (ecpVer1),
  7495. fieldID FieldID {{FieldTypes}},
  7496. curve X9Curve,
  7497. base X9ECPoint,
  7498. order Integer,
  7499. cofactor Integer OPTIONAL
  7500. }
  7501. </pre>
  7502. </member>
  7503. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECPoint">
  7504. class for describing an ECPoint as a Der object.
  7505. </member>
  7506. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECPoint.ToAsn1Object">
  7507. Produce an object suitable for an Asn1OutputStream.
  7508. <pre>
  7509. ECPoint ::= OCTET STRING
  7510. </pre>
  7511. <p>
  7512. Octet string produced using ECPoint.GetEncoded().</p>
  7513. </member>
  7514. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9FieldElement">
  7515. Class for processing an ECFieldElement as a DER object.
  7516. </member>
  7517. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9FieldElement.ToAsn1Object">
  7518. Produce an object suitable for an Asn1OutputStream.
  7519. <pre>
  7520. FieldElement ::= OCTET STRING
  7521. </pre>
  7522. <p>
  7523. <ol>
  7524. <li> if <i>q</i> is an odd prime then the field element is
  7525. processed as an Integer and converted to an octet string
  7526. according to x 9.62 4.3.1.</li>
  7527. <li> if <i>q</i> is 2<sup>m</sup> then the bit string
  7528. contained in the field element is converted into an octet
  7529. string with the same ordering padded at the front if necessary.
  7530. </li>
  7531. </ol>
  7532. </p>
  7533. </member>
  7534. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9FieldID">
  7535. ASN.1 def for Elliptic-Curve Field ID structure. See
  7536. X9.62, for further details.
  7537. </member>
  7538. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9FieldID.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  7539. Constructor for elliptic curves over prime fields
  7540. <code>F<sub>2</sub></code>.
  7541. @param primeP The prime <code>p</code> defining the prime field.
  7542. </member>
  7543. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9FieldID.#ctor(System.Int32,System.Int32)">
  7544. Constructor for elliptic curves over binary fields
  7545. <code>F<sub>2<sup>m</sup></sub></code>.
  7546. @param m The exponent <code>m</code> of
  7547. <code>F<sub>2<sup>m</sup></sub></code>.
  7548. @param k1 The integer <code>k1</code> where <code>x<sup>m</sup> +
  7549. x<sup>k1</sup> + 1</code>
  7550. represents the reduction polynomial <code>f(z)</code>.
  7551. </member>
  7552. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9FieldID.#ctor(System.Int32,System.Int32,System.Int32,System.Int32)">
  7553. Constructor for elliptic curves over binary fields
  7554. <code>F<sub>2<sup>m</sup></sub></code>.
  7555. @param m The exponent <code>m</code> of
  7556. <code>F<sub>2<sup>m</sup></sub></code>.
  7557. @param k1 The integer <code>k1</code> where <code>x<sup>m</sup> +
  7558. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  7559. represents the reduction polynomial <code>f(z)</code>.
  7560. @param k2 The integer <code>k2</code> where <code>x<sup>m</sup> +
  7561. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  7562. represents the reduction polynomial <code>f(z)</code>.
  7563. @param k3 The integer <code>k3</code> where <code>x<sup>m</sup> +
  7564. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  7565. represents the reduction polynomial <code>f(z)</code>..
  7566. </member>
  7567. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9FieldID.ToAsn1Object">
  7568. Produce a Der encoding of the following structure.
  7569. <pre>
  7570. FieldID ::= Sequence {
  7571. fieldType FIELD-ID.&amp;id({IOSet}),
  7572. parameters FIELD-ID.&amp;Type({IOSet}{&#64;fieldType})
  7573. }
  7574. </pre>
  7575. </member>
  7576. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ObjectIdentifiers.IdDsaWithSha1">
  7577. id-dsa-with-sha1 OBJECT IDENTIFIER ::= { iso(1) member-body(2)
  7578. us(840) x9-57 (10040) x9cm(4) 3 }
  7579. </member>
  7580. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ObjectIdentifiers.X9x63Scheme">
  7581. X9.63
  7582. </member>
  7583. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ObjectIdentifiers.ansi_x9_42">
  7584. X9.42
  7585. </member>
  7586. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredInputStream">
  7587. reader for Base64 armored objects - read the headers and then start returning
  7588. bytes when the data is reached. An IOException is thrown if the CRC check
  7589. is detected and fails.
  7590. <p>
  7591. By default a missing CRC will not cause an exception. To force CRC detection use:
  7592. <pre>
  7593. ArmoredInputStream aIn = ...
  7594. aIn.setDetectMissingCRC(true);
  7595. </pre>
  7596. </p>
  7597. </member>
  7598. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredInputStream.Decode(System.Int32,System.Int32,System.Int32,System.Int32,System.Int32[])">
  7599. decode the base 64 encoded input data.
  7600. @return the offset the data starts in out.
  7601. </member>
  7602. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredInputStream.#ctor(System.IO.Stream)">
  7603. Create a stream for reading a PGP armoured message, parsing up to a header
  7604. and then reading the data that follows.
  7605. @param input
  7606. </member>
  7607. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredInputStream.#ctor(System.IO.Stream,System.Boolean)">
  7608. Create an armoured input stream which will assume the data starts
  7609. straight away, or parse for headers first depending on the value of
  7610. hasHeaders.
  7611. @param input
  7612. @param hasHeaders true if headers are to be looked for, false otherwise.
  7613. </member>
  7614. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredInputStream.IsClearText">
  7615. @return true if we are inside the clear text section of a PGP
  7616. signed message.
  7617. </member>
  7618. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredInputStream.IsEndOfStream">
  7619. @return true if the stream is actually at end of file.
  7620. </member>
  7621. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredInputStream.GetArmorHeaderLine">
  7622. Return the armor header line (if there is one)
  7623. @return the armor header line, null if none present.
  7624. </member>
  7625. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredInputStream.GetArmorHeaders">
  7626. Return the armor headers (the lines after the armor header line),
  7627. @return an array of armor headers, null if there aren't any.
  7628. </member>
  7629. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredInputStream.SetDetectMissingCrc(System.Boolean)">
  7630. Change how the stream should react if it encounters missing CRC checksum.
  7631. The default value is false (ignore missing CRC checksums). If the behavior is set to true,
  7632. an {@link IOException} will be thrown if a missing CRC checksum is encountered.
  7633. @param detectMissing ignore missing CRC sums
  7634. </member>
  7635. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredOutputStream">
  7636. Basic output stream.
  7637. </member>
  7638. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredOutputStream.Encode(System.IO.Stream,System.Int32[],System.Int32)">
  7639. encode the input data producing a base 64 encoded byte array.
  7640. </member>
  7641. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredOutputStream.SetHeader(System.String,System.String)">
  7642. Set an additional header entry. Any current value(s) under the same name will be
  7643. replaced by the new one. A null value will clear the entry for name. *
  7644. @param name the name of the header entry.
  7645. @param v the value of the header entry.
  7646. </member>
  7647. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredOutputStream.AddHeader(System.String,System.String)">
  7648. Set an additional header entry. The current value(s) will continue to exist together
  7649. with the new one. Adding a null value has no effect.
  7650. @param name the name of the header entry.
  7651. @param value the value of the header entry.
  7652. </member>
  7653. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredOutputStream.ResetHeaders">
  7654. Reset the headers to only contain a Version string (if one is present).
  7655. </member>
  7656. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredOutputStream.BeginClearText(Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.HashAlgorithmTag)">
  7657. Start a clear text signed message.
  7658. @param hashAlgorithm
  7659. </member>
  7660. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ArmoredOutputStream.Dispose(System.Boolean)">
  7661. <b>Note</b>: Close() does not close the underlying stream. So it is possible to write
  7662. multiple objects using armoring to a single stream.
  7663. </member>
  7664. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Attr.ImageAttrib">
  7665. <remarks>Basic type for a image attribute packet.</remarks>
  7666. </member>
  7667. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgInputStream">
  7668. <remarks>Reader for PGP objects.</remarks>
  7669. </member>
  7670. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgInputStream.NextPacketTag">
  7671. <summary>Returns the next packet tag in the stream.</summary>
  7672. </member>
  7673. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgInputStream.PartialInputStream">
  7674. <summary>
  7675. A stream that overlays our input stream, allowing the user to only read a segment of it.
  7676. NB: dataLength will be negative if the segment length is in the upper range above 2**31.
  7677. </summary>
  7678. </member>
  7679. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgObject">
  7680. <remarks>Base class for a PGP object.</remarks>
  7681. </member>
  7682. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgOutputStream">
  7683. <remarks>Basic output stream.</remarks>
  7684. </member>
  7685. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgOutputStream.#ctor(System.IO.Stream)">
  7686. <summary>Create a stream representing a general packet.</summary>
  7687. <param name="outStr">Output stream to write to.</param>
  7688. </member>
  7689. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgOutputStream.#ctor(System.IO.Stream,Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PacketTag)">
  7690. <summary>Create a stream representing an old style partial object.</summary>
  7691. <param name="outStr">Output stream to write to.</param>
  7692. <param name="tag">The packet tag for the object.</param>
  7693. </member>
  7694. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgOutputStream.#ctor(System.IO.Stream,Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PacketTag,System.Int64,System.Boolean)">
  7695. <summary>Create a stream representing a general packet.</summary>
  7696. <param name="outStr">Output stream to write to.</param>
  7697. <param name="tag">Packet tag.</param>
  7698. <param name="length">Size of chunks making up the packet.</param>
  7699. <param name="oldFormat">If true, the header is written out in old format.</param>
  7700. </member>
  7701. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgOutputStream.#ctor(System.IO.Stream,Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PacketTag,System.Int64)">
  7702. <summary>Create a new style partial input stream buffered into chunks.</summary>
  7703. <param name="outStr">Output stream to write to.</param>
  7704. <param name="tag">Packet tag.</param>
  7705. <param name="length">Size of chunks making up the packet.</param>
  7706. </member>
  7707. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgOutputStream.#ctor(System.IO.Stream,Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PacketTag,System.Byte[])">
  7708. <summary>Create a new style partial input stream buffered into chunks.</summary>
  7709. <param name="outStr">Output stream to write to.</param>
  7710. <param name="tag">Packet tag.</param>
  7711. <param name="buffer">Buffer to use for collecting chunks.</param>
  7712. </member>
  7713. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgOutputStream.Flush">
  7714. <summary>Flush the underlying stream.</summary>
  7715. </member>
  7716. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgOutputStream.Finish">
  7717. <summary>Finish writing out the current packet without closing the underlying stream.</summary>
  7718. </member>
  7719. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.CompressedDataPacket">
  7720. <remarks>Generic compressed data object.</remarks>
  7721. </member>
  7722. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.CompressedDataPacket.Algorithm">
  7723. <summary>The algorithm tag value.</summary>
  7724. </member>
  7725. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.CompressionAlgorithmTag">
  7726. <remarks>Basic tags for compression algorithms.</remarks>
  7727. </member>
  7728. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ContainedPacket">
  7729. <remarks>Basic type for a PGP packet.</remarks>
  7730. </member>
  7731. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.DsaPublicBcpgKey">
  7732. <remarks>Base class for a DSA public key.</remarks>
  7733. </member>
  7734. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.DsaPublicBcpgKey.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7735. <param name="bcpgIn">The stream to read the packet from.</param>
  7736. </member>
  7737. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.DsaPublicBcpgKey.Format">
  7738. <summary>The format, as a string, always "PGP".</summary>
  7739. </member>
  7740. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.DsaPublicBcpgKey.GetEncoded">
  7741. <summary>Return the standard PGP encoding of the key.</summary>
  7742. </member>
  7743. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.DsaSecretBcpgKey">
  7744. <remarks>Base class for a DSA secret key.</remarks>
  7745. </member>
  7746. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.DsaSecretBcpgKey.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7747. @param in
  7748. </member>
  7749. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.DsaSecretBcpgKey.Format">
  7750. <summary>The format, as a string, always "PGP".</summary>
  7751. </member>
  7752. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.DsaSecretBcpgKey.GetEncoded">
  7753. <summary>Return the standard PGP encoding of the key.</summary>
  7754. </member>
  7755. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.DsaSecretBcpgKey.X">
  7756. @return x
  7757. </member>
  7758. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ECDHPublicBcpgKey">
  7759. <remarks>Base class for an ECDH Public Key.</remarks>
  7760. </member>
  7761. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ECDHPublicBcpgKey.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7762. <param name="bcpgIn">The stream to read the packet from.</param>
  7763. </member>
  7764. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ECDsaPublicBcpgKey">
  7765. <remarks>Base class for an ECDSA Public Key.</remarks>
  7766. </member>
  7767. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ECDsaPublicBcpgKey.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7768. <param name="bcpgIn">The stream to read the packet from.</param>
  7769. </member>
  7770. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ECPublicBcpgKey">
  7771. <remarks>Base class for an EC Public Key.</remarks>
  7772. </member>
  7773. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ECPublicBcpgKey.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7774. <param name="bcpgIn">The stream to read the packet from.</param>
  7775. </member>
  7776. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ECPublicBcpgKey.Format">
  7777. <summary>The format, as a string, always "PGP".</summary>
  7778. </member>
  7779. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ECPublicBcpgKey.GetEncoded">
  7780. <summary>Return the standard PGP encoding of the key.</summary>
  7781. </member>
  7782. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ECSecretBcpgKey">
  7783. <remarks>Base class for an EC Secret Key.</remarks>
  7784. </member>
  7785. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ECSecretBcpgKey.Format">
  7786. <summary>The format, as a string, always "PGP".</summary>
  7787. </member>
  7788. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ECSecretBcpgKey.GetEncoded">
  7789. <summary>Return the standard PGP encoding of the key.</summary>
  7790. </member>
  7791. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ElGamalPublicBcpgKey">
  7792. <remarks>Base class for an ElGamal public key.</remarks>
  7793. </member>
  7794. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ElGamalPublicBcpgKey.Format">
  7795. <summary>The format, as a string, always "PGP".</summary>
  7796. </member>
  7797. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ElGamalPublicBcpgKey.GetEncoded">
  7798. <summary>Return the standard PGP encoding of the key.</summary>
  7799. </member>
  7800. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ElGamalSecretBcpgKey">
  7801. <remarks>Base class for an ElGamal secret key.</remarks>
  7802. </member>
  7803. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ElGamalSecretBcpgKey.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7804. @param in
  7805. </member>
  7806. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ElGamalSecretBcpgKey.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  7807. @param x
  7808. </member>
  7809. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ElGamalSecretBcpgKey.Format">
  7810. <summary>The format, as a string, always "PGP".</summary>
  7811. </member>
  7812. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ElGamalSecretBcpgKey.GetEncoded">
  7813. <summary>Return the standard PGP encoding of the key.</summary>
  7814. </member>
  7815. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ExperimentalPacket">
  7816. <remarks>Basic packet for an experimental packet.</remarks>
  7817. </member>
  7818. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.HashAlgorithmTag">
  7819. <remarks>Basic tags for hash algorithms.</remarks>
  7820. </member>
  7821. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.IBcpgKey">
  7822. <remarks>Base interface for a PGP key.</remarks>
  7823. </member>
  7824. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.IBcpgKey.Format">
  7825. <summary>
  7826. The base format for this key - in the case of the symmetric keys it will generally
  7827. be raw indicating that the key is just a straight byte representation, for an asymmetric
  7828. key the format will be PGP, indicating the key is a string of MPIs encoded in PGP format.
  7829. </summary>
  7830. <returns>"RAW" or "PGP".</returns>
  7831. </member>
  7832. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.InputStreamPacket.GetInputStream">
  7833. <summary>Note: you can only read from this once...</summary>
  7834. </member>
  7835. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.LiteralDataPacket">
  7836. <remarks>Generic literal data packet.</remarks>
  7837. </member>
  7838. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.LiteralDataPacket.Format">
  7839. <summary>The format tag value.</summary>
  7840. </member>
  7841. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.LiteralDataPacket.ModificationTime">
  7842. <summary>The modification time of the file in milli-seconds (since Jan 1, 1970 UTC)</summary>
  7843. </member>
  7844. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.MarkerPacket">
  7845. <remarks>Basic type for a marker packet.</remarks>
  7846. </member>
  7847. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.ModDetectionCodePacket">
  7848. <remarks>Basic packet for a modification detection code packet.</remarks>
  7849. </member>
  7850. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.MPInteger">
  7851. <remarks>A multiple precision integer</remarks>
  7852. </member>
  7853. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.OnePassSignaturePacket">
  7854. <remarks>Generic signature object</remarks>
  7855. </member>
  7856. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.OnePassSignaturePacket.KeyAlgorithm">
  7857. <summary>The encryption algorithm tag.</summary>
  7858. </member>
  7859. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.OnePassSignaturePacket.HashAlgorithm">
  7860. <summary>The hash algorithm tag.</summary>
  7861. </member>
  7862. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PacketTag">
  7863. <remarks>Basic PGP packet tag types.</remarks>
  7864. </member>
  7865. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag">
  7866. <remarks>Public Key Algorithm tag numbers.</remarks>
  7867. </member>
  7868. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PublicKeyEncSessionPacket">
  7869. <remarks>Basic packet for a PGP public key.</remarks>
  7870. </member>
  7871. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PublicKeyPacket">
  7872. <remarks>Basic packet for a PGP public key.</remarks>
  7873. </member>
  7874. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PublicKeyPacket.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,System.DateTime,Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.IBcpgKey)">
  7875. <summary>Construct a version 4 public key packet.</summary>
  7876. </member>
  7877. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PublicSubkeyPacket">
  7878. <remarks>Basic packet for a PGP public subkey</remarks>
  7879. </member>
  7880. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PublicSubkeyPacket.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,System.DateTime,Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.IBcpgKey)">
  7881. <summary>Construct a version 4 public subkey packet.</summary>
  7882. </member>
  7883. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.RsaPublicBcpgKey">
  7884. <remarks>Base class for an RSA public key.</remarks>
  7885. </member>
  7886. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.RsaPublicBcpgKey.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7887. <summary>Construct an RSA public key from the passed in stream.</summary>
  7888. </member>
  7889. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.RsaPublicBcpgKey.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  7890. <param name="n">The modulus.</param>
  7891. <param name="e">The public exponent.</param>
  7892. </member>
  7893. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.RsaPublicBcpgKey.Format">
  7894. <summary>The format, as a string, always "PGP".</summary>
  7895. </member>
  7896. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.RsaPublicBcpgKey.GetEncoded">
  7897. <summary>Return the standard PGP encoding of the key.</summary>
  7898. </member>
  7899. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.RsaSecretBcpgKey">
  7900. <remarks>Base class for an RSA secret (or priate) key.</remarks>
  7901. </member>
  7902. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.RsaSecretBcpgKey.Format">
  7903. <summary>The format, as a string, always "PGP".</summary>
  7904. </member>
  7905. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.RsaSecretBcpgKey.GetEncoded">
  7906. <summary>Return the standard PGP encoding of the key.</summary>
  7907. </member>
  7908. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.S2k">
  7909. <remarks>The string to key specifier class.</remarks>
  7910. </member>
  7911. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.S2k.HashAlgorithm">
  7912. <summary>The hash algorithm.</summary>
  7913. </member>
  7914. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.S2k.GetIV">
  7915. <summary>The IV for the key generation algorithm.</summary>
  7916. </member>
  7917. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.S2k.IterationCount">
  7918. <summary>The iteration count</summary>
  7919. </member>
  7920. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.S2k.ProtectionMode">
  7921. <summary>The protection mode - only if GnuDummyS2K</summary>
  7922. </member>
  7923. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SecretKeyPacket">
  7924. <remarks>Basic packet for a PGP secret key.</remarks>
  7925. </member>
  7926. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SecretSubkeyPacket">
  7927. <remarks>Basic packet for a PGP secret key.</remarks>
  7928. </member>
  7929. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.EmbeddedSignature">
  7930. Packet embedded signature
  7931. </member>
  7932. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.Exportable">
  7933. packet giving signature creation time.
  7934. </member>
  7935. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.Features">
  7936. packet giving signature expiration time.
  7937. </member>
  7938. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.Features.FEATURE_MODIFICATION_DETECTION">
  7939. Identifier for the Modification Detection (packets 18 and 19)
  7940. </member>
  7941. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.Features.FEATURE_AEAD_ENCRYPTED_DATA">
  7942. Identifier for the AEAD Encrypted Data Packet (packet 20) and version 5
  7943. Symmetric-Key Encrypted Session Key Packets (packet 3)
  7944. </member>
  7945. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.Features.FEATURE_VERSION_5_PUBLIC_KEY">
  7946. Identifier for the Version 5 Public-Key Packet format and corresponding new
  7947. fingerprint format
  7948. </member>
  7949. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.Features.SupportsModificationDetection">
  7950. Returns if modification detection is supported.
  7951. </member>
  7952. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.Features.SupportsFeature(System.Byte)">
  7953. Returns if a particular feature is supported.
  7954. </member>
  7955. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.IssuerKeyId">
  7956. packet giving signature creation time.
  7957. </member>
  7958. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.KeyExpirationTime">
  7959. packet giving time after creation at which the key expires.
  7960. </member>
  7961. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.KeyExpirationTime.Time">
  7962. Return the number of seconds after creation time a key is valid for.
  7963. @return second count for key validity.
  7964. </member>
  7965. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.KeyFlags">
  7966. Packet holding the key flag values.
  7967. </member>
  7968. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.KeyFlags.Flags">
  7969. <summary>
  7970. Return the flag values contained in the first 4 octets (note: at the moment
  7971. the standard only uses the first one).
  7972. </summary>
  7973. </member>
  7974. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.NotationData">
  7975. Class provided a NotationData object according to
  7976. RFC2440, Chapter 5.2.3.15. Notation Data
  7977. </member>
  7978. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.PreferredAlgorithms">
  7979. packet giving signature creation time.
  7980. </member>
  7981. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.PrimaryUserId">
  7982. packet giving whether or not the signature is signed using the primary user ID for the key.
  7983. </member>
  7984. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.Revocable">
  7985. packet giving whether or not is revocable.
  7986. </member>
  7987. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.SignatureCreationTime">
  7988. packet giving signature creation time.
  7989. </member>
  7990. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.SignatureExpirationTime">
  7991. packet giving signature expiration time.
  7992. </member>
  7993. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.SignatureExpirationTime.Time">
  7994. return time in seconds before signature expires after creation time.
  7995. </member>
  7996. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.SignerUserId">
  7997. packet giving the User ID of the signer.
  7998. </member>
  7999. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig.TrustSignature">
  8000. packet giving trust.
  8001. </member>
  8002. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.RevocationKey">
  8003. <summary>
  8004. Represents revocation key OpenPGP signature sub packet.
  8005. </summary>
  8006. </member>
  8007. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.RevocationReason">
  8008. <summary>
  8009. Represents revocation reason OpenPGP signature sub packet.
  8010. </summary>
  8011. </member>
  8012. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignaturePacket">
  8013. <remarks>Generic signature packet.</remarks>
  8014. </member>
  8015. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignaturePacket.#ctor(System.Int32,System.Int64,Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.HashAlgorithmTag,Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignatureSubpacket[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignatureSubpacket[],System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.MPInteger[])">
  8016. Generate a version 4 signature packet.
  8017. @param signatureType
  8018. @param keyAlgorithm
  8019. @param hashAlgorithm
  8020. @param hashedData
  8021. @param unhashedData
  8022. @param fingerprint
  8023. @param signature
  8024. </member>
  8025. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignaturePacket.#ctor(System.Int32,System.Int32,System.Int64,Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.HashAlgorithmTag,System.Int64,System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.MPInteger[])">
  8026. Generate a version 2/3 signature packet.
  8027. @param signatureType
  8028. @param keyAlgorithm
  8029. @param hashAlgorithm
  8030. @param fingerprint
  8031. @param signature
  8032. </member>
  8033. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignaturePacket.KeyId">
  8034. return the keyId
  8035. @return the keyId that created the signature.
  8036. </member>
  8037. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignaturePacket.GetSignatureTrailer">
  8038. return the signature trailer that must be included with the data
  8039. to reconstruct the signature
  8040. @return byte[]
  8041. </member>
  8042. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignaturePacket.GetSignature">
  8043. * return the signature as a set of integers - note this is normalised to be the
  8044. * ASN.1 encoding of what appears in the signature packet.
  8045. </member>
  8046. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignaturePacket.GetSignatureBytes">
  8047. Return the byte encoding of the signature section.
  8048. @return uninterpreted signature bytes.
  8049. </member>
  8050. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignaturePacket.CreationTime">
  8051. <summary>Return the creation time in milliseconds since 1 Jan., 1970 UTC.</summary>
  8052. </member>
  8053. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignatureSubpacket">
  8054. <remarks>Basic type for a PGP Signature sub-packet.</remarks>
  8055. </member>
  8056. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignatureSubpacket.GetData">
  8057. <summary>Return the generic data making up the packet.</summary>
  8058. </member>
  8059. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignatureSubpacketsParser">
  8060. reader for signature sub-packets
  8061. </member>
  8062. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SignatureSubpacketTag">
  8063. Basic PGP signature sub-packet tag types.
  8064. </member>
  8065. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SymmetricEncDataPacket">
  8066. <remarks>Basic type for a symmetric key encrypted packet.</remarks>
  8067. </member>
  8068. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag">
  8069. Basic tags for symmetric key algorithms
  8070. </member>
  8071. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SymmetricKeyEncSessionPacket">
  8072. Basic type for a symmetric encrypted session key packet
  8073. </member>
  8074. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SymmetricKeyEncSessionPacket.EncAlgorithm">
  8075. @return int
  8076. </member>
  8077. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SymmetricKeyEncSessionPacket.S2k">
  8078. @return S2k
  8079. </member>
  8080. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SymmetricKeyEncSessionPacket.GetSecKeyData">
  8081. @return byte[]
  8082. </member>
  8083. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.SymmetricKeyEncSessionPacket.Version">
  8084. @return int
  8085. </member>
  8086. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.TrustPacket">
  8087. <summary>Basic type for a trust packet.</summary>
  8088. </member>
  8089. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.UserAttributePacket">
  8090. Basic type for a user attribute packet.
  8091. </member>
  8092. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.UserAttributeSubpacket">
  8093. Basic type for a user attribute sub-packet.
  8094. </member>
  8095. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.UserAttributeSubpacket.GetData">
  8096. return the generic data making up the packet.
  8097. </member>
  8098. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.UserAttributeSubpacketsParser">
  8099. reader for user attribute sub-packets
  8100. </member>
  8101. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.UserAttributeSubpacketTag">
  8102. Basic PGP user attribute sub-packet tag types.
  8103. </member>
  8104. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.UserIdPacket">
  8105. Basic type for a user ID packet.
  8106. </member>
  8107. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.GeneralPkiMessage.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiMessage)">
  8108. <summary>
  8109. Wrap a PKIMessage ASN.1 structure.
  8110. </summary>
  8111. <param name="pkiMessage">PKI message.</param>
  8112. </member>
  8113. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.GeneralPkiMessage.#ctor(System.Byte[])">
  8114. <summary>
  8115. Create a PKIMessage from the passed in bytes.
  8116. </summary>
  8117. <param name="encoding">BER/DER encoding of the PKIMessage</param>
  8118. </member>
  8119. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.GeneralPkiMessage.HasProtection">
  8120. <summary>
  8121. Return true if this message has protection bits on it. A return value of true
  8122. indicates the message can be used to construct a ProtectedPKIMessage.
  8123. </summary>
  8124. </member>
  8125. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.ProtectedPkiMessage">
  8126. <summary>
  8127. Wrapper for a PKIMessage with protection attached to it.
  8128. </summary>
  8129. </member>
  8130. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.ProtectedPkiMessage.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.GeneralPkiMessage)">
  8131. <summary>
  8132. Wrap a general message.
  8133. </summary>
  8134. <exception cref="T:System.ArgumentException">If the general message does not have protection.</exception>
  8135. <param name="pkiMessage">The General message</param>
  8136. </member>
  8137. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.ProtectedPkiMessage.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiMessage)">
  8138. <summary>
  8139. Wrap a PKI message.
  8140. </summary>
  8141. <exception cref="T:System.ArgumentException">If the PKI message does not have protection.</exception>
  8142. <param name="pkiMessage">The PKI message</param>
  8143. </member>
  8144. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.ProtectedPkiMessage.Header">
  8145. <summary>Message header</summary>
  8146. </member>
  8147. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.ProtectedPkiMessage.Body">
  8148. <summary>Message body</summary>
  8149. </member>
  8150. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.ProtectedPkiMessage.ToAsn1Message">
  8151. <summary>
  8152. Return the underlying ASN.1 structure contained in this object.
  8153. </summary>
  8154. <returns>PkiMessage structure</returns>
  8155. </member>
  8156. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.ProtectedPkiMessage.HasPasswordBasedMacProtected">
  8157. <summary>
  8158. Determine whether the message is protected by a password based MAC. Use verify(PKMACBuilder, char[])
  8159. to verify the message if this method returns true.
  8160. </summary>
  8161. <returns>true if protection MAC PBE based, false otherwise.</returns>
  8162. </member>
  8163. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.ProtectedPkiMessage.GetCertificates">
  8164. <summary>
  8165. Return the extra certificates associated with this message.
  8166. </summary>
  8167. <returns>an array of extra certificates, zero length if none present.</returns>
  8168. </member>
  8169. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.ProtectedPkiMessage.Verify(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifierFactory)">
  8170. <summary>
  8171. Verify a message with a public key based signature attached.
  8172. </summary>
  8173. <param name="verifierFactory">a factory of signature verifiers.</param>
  8174. <returns>true if the provider is able to create a verifier that validates the signature, false otherwise.</returns>
  8175. </member>
  8176. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp.ProtectedPkiMessage.Verify(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PKMacBuilder,System.Char[])">
  8177. <summary>
  8178. Verify a message with password based MAC protection.
  8179. </summary>
  8180. <param name="pkMacBuilder">MAC builder that can be used to construct the appropriate MacCalculator</param>
  8181. <param name="password">the MAC password</param>
  8182. <returns>true if the passed in password and MAC builder verify the message, false otherwise.</returns>
  8183. <exception cref="T:System.InvalidOperationException">if algorithm not MAC based, or an exception is thrown verifying the MAC.</exception>
  8184. </member>
  8185. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableParameter">
  8186. <remarks>
  8187. The 'Signature' parameter is only available when generating unsigned attributes.
  8188. </remarks>
  8189. </member>
  8190. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedData">
  8191. containing class for an CMS Authenticated Data object
  8192. </member>
  8193. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedData.MacAlgOid">
  8194. return the object identifier for the content MAC algorithm.
  8195. </member>
  8196. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedData.GetRecipientInfos">
  8197. return a store of the intended recipients for this message
  8198. </member>
  8199. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedData.ContentInfo">
  8200. return the ContentInfo
  8201. </member>
  8202. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedData.GetAuthAttrs">
  8203. return a table of the digested attributes indexed by
  8204. the OID of the attribute.
  8205. </member>
  8206. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedData.GetUnauthAttrs">
  8207. return a table of the undigested attributes indexed by
  8208. the OID of the attribute.
  8209. </member>
  8210. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedData.GetEncoded">
  8211. return the ASN.1 encoded representation of this object.
  8212. </member>
  8213. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataGenerator">
  8214. General class for generating a CMS authenticated-data message.
  8215. A simple example of usage.
  8216. <pre>
  8217. CMSAuthenticatedDataGenerator fact = new CMSAuthenticatedDataGenerator();
  8218. fact.addKeyTransRecipient(cert);
  8219. CMSAuthenticatedData data = fact.generate(content, algorithm, "BC");
  8220. </pre>
  8221. </member>
  8222. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  8223. <summary>Constructor allowing specific source of randomness</summary>
  8224. <param name="random">Instance of <c>SecureRandom</c> to use.</param>
  8225. </member>
  8226. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessable,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.CipherKeyGenerator)">
  8227. generate an enveloped object that contains an CMS Enveloped Data
  8228. object using the given provider and the passed in key generator.
  8229. </member>
  8230. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessable,System.String)">
  8231. generate an authenticated object that contains an CMS Authenticated Data object
  8232. </member>
  8233. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataParser">
  8234. Parsing class for an CMS Authenticated Data object from an input stream.
  8235. <p>
  8236. Note: that because we are in a streaming mode only one recipient can be tried and it is important
  8237. that the methods on the parser are called in the appropriate order.
  8238. </p>
  8239. <p>
  8240. Example of use - assuming the first recipient matches the private key we have.
  8241. <pre>
  8242. CMSAuthenticatedDataParser ad = new CMSAuthenticatedDataParser(inputStream);
  8243. RecipientInformationStore recipients = ad.getRecipientInfos();
  8244. Collection c = recipients.getRecipients();
  8245. Iterator it = c.iterator();
  8246. if (it.hasNext())
  8247. {
  8248. RecipientInformation recipient = (RecipientInformation)it.next();
  8249. CMSTypedStream recData = recipient.getContentStream(privateKey, "BC");
  8250. processDataStream(recData.getContentStream());
  8251. if (!Arrays.equals(ad.getMac(), recipient.getMac())
  8252. {
  8253. System.err.println("Data corrupted!!!!");
  8254. }
  8255. }
  8256. </pre>
  8257. Note: this class does not introduce buffering - if you are processing large files you should create
  8258. the parser with:
  8259. <pre>
  8260. CMSAuthenticatedDataParser ep = new CMSAuthenticatedDataParser(new BufferedInputStream(inputStream, bufSize));
  8261. </pre>
  8262. where bufSize is a suitably large buffer size.
  8263. </p>
  8264. </member>
  8265. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataParser.MacAlgOid">
  8266. return the object identifier for the mac algorithm.
  8267. </member>
  8268. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataParser.MacAlgParams">
  8269. return the ASN.1 encoded encryption algorithm parameters, or null if
  8270. there aren't any.
  8271. </member>
  8272. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataParser.GetRecipientInfos">
  8273. return a store of the intended recipients for this message
  8274. </member>
  8275. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataParser.GetAuthAttrs">
  8276. return a table of the unauthenticated attributes indexed by
  8277. the OID of the attribute.
  8278. @exception java.io.IOException
  8279. </member>
  8280. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataParser.GetUnauthAttrs">
  8281. return a table of the unauthenticated attributes indexed by
  8282. the OID of the attribute.
  8283. @exception java.io.IOException
  8284. </member>
  8285. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator">
  8286. General class for generating a CMS authenticated-data message stream.
  8287. <p>
  8288. A simple example of usage.
  8289. <pre>
  8290. CMSAuthenticatedDataStreamGenerator edGen = new CMSAuthenticatedDataStreamGenerator();
  8291. edGen.addKeyTransRecipient(cert);
  8292. ByteArrayOutputStream bOut = new ByteArrayOutputStream();
  8293. OutputStream out = edGen.open(
  8294. bOut, CMSAuthenticatedDataGenerator.AES128_CBC, "BC");*
  8295. out.write(data);
  8296. out.close();
  8297. </pre>
  8298. </p>
  8299. </member>
  8300. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  8301. <summary>Constructor allowing specific source of randomness</summary>
  8302. <param name="random">Instance of <c>SecureRandom</c> to use.</param>
  8303. </member>
  8304. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.SetBufferSize(System.Int32)">
  8305. Set the underlying string size for encapsulated data
  8306. @param bufferSize length of octet strings to buffer the data.
  8307. </member>
  8308. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.SetBerEncodeRecipients(System.Boolean)">
  8309. Use a BER Set to store the recipient information
  8310. </member>
  8311. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.Open(System.IO.Stream,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.CipherKeyGenerator)">
  8312. generate an enveloped object that contains an CMS Enveloped Data
  8313. object using the given provider and the passed in key generator.
  8314. @throws java.io.IOException
  8315. </member>
  8316. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.Open(System.IO.Stream,System.String)">
  8317. generate an enveloped object that contains an CMS Enveloped Data object
  8318. </member>
  8319. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.Open(System.IO.Stream,System.String,System.Int32)">
  8320. generate an enveloped object that contains an CMS Enveloped Data object
  8321. </member>
  8322. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthenticatedGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  8323. <summary>Constructor allowing specific source of randomness</summary>
  8324. <param name="random">Instance of <c>SecureRandom</c> to use.</param>
  8325. </member>
  8326. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAuthEnvelopedData">
  8327. containing class for an CMS AuthEnveloped Data object
  8328. </member>
  8329. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsCompressedData">
  8330. containing class for an CMS Compressed Data object
  8331. </member>
  8332. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsCompressedData.GetContent">
  8333. Return the uncompressed content.
  8334. @return the uncompressed content
  8335. @throws CmsException if there is an exception uncompressing the data.
  8336. </member>
  8337. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsCompressedData.GetContent(System.Int32)">
  8338. Return the uncompressed content, throwing an exception if the data size
  8339. is greater than the passed in limit. If the content is exceeded getCause()
  8340. on the CMSException will contain a StreamOverflowException
  8341. @param limit maximum number of bytes to read
  8342. @return the content read
  8343. @throws CMSException if there is an exception uncompressing the data.
  8344. </member>
  8345. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsCompressedData.ContentInfo">
  8346. return the ContentInfo
  8347. </member>
  8348. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsCompressedData.GetEncoded">
  8349. return the ASN.1 encoded representation of this object.
  8350. </member>
  8351. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsCompressedDataGenerator">
  8352. * General class for generating a compressed CMS message.
  8353. * <p>
  8354. * A simple example of usage.</p>
  8355. * <p>
  8356. * <pre>
  8357. * CMSCompressedDataGenerator fact = new CMSCompressedDataGenerator();
  8358. * CMSCompressedData data = fact.Generate(content, algorithm);
  8359. * </pre>
  8360. * </p>
  8361. </member>
  8362. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsCompressedDataGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessable,System.String)">
  8363. Generate an object that contains an CMS Compressed Data
  8364. </member>
  8365. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsCompressedDataParser">
  8366. Class for reading a CMS Compressed Data stream.
  8367. <pre>
  8368. CMSCompressedDataParser cp = new CMSCompressedDataParser(inputStream);
  8369. process(cp.GetContent().GetContentStream());
  8370. </pre>
  8371. Note: this class does not introduce buffering - if you are processing large files you should create
  8372. the parser with:
  8373. <pre>
  8374. CMSCompressedDataParser ep = new CMSCompressedDataParser(new BufferedInputStream(inputStream, bufSize));
  8375. </pre>
  8376. where bufSize is a suitably large buffer size.
  8377. </member>
  8378. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsCompressedDataStreamGenerator">
  8379. General class for generating a compressed CMS message stream.
  8380. <p>
  8381. A simple example of usage.
  8382. </p>
  8383. <pre>
  8384. CMSCompressedDataStreamGenerator gen = new CMSCompressedDataStreamGenerator();
  8385. Stream cOut = gen.Open(outputStream, CMSCompressedDataStreamGenerator.ZLIB);
  8386. cOut.Write(data);
  8387. cOut.Close();
  8388. </pre>
  8389. </member>
  8390. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsCompressedDataStreamGenerator.#ctor">
  8391. base constructor
  8392. </member>
  8393. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsCompressedDataStreamGenerator.SetBufferSize(System.Int32)">
  8394. Set the underlying string size for encapsulated data
  8395. @param bufferSize length of octet strings to buffer the data.
  8396. </member>
  8397. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsContentInfoParser.Close">
  8398. Close the underlying data stream.
  8399. @throws IOException if the close fails.
  8400. </member>
  8401. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedData">
  8402. containing class for an CMS Enveloped Data object
  8403. </member>
  8404. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedData.EncryptionAlgOid">
  8405. return the object identifier for the content encryption algorithm.
  8406. </member>
  8407. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedData.GetRecipientInfos">
  8408. return a store of the intended recipients for this message
  8409. </member>
  8410. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedData.ContentInfo">
  8411. return the ContentInfo
  8412. </member>
  8413. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedData.GetUnprotectedAttributes">
  8414. return a table of the unprotected attributes indexed by
  8415. the OID of the attribute.
  8416. </member>
  8417. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedData.GetEncoded">
  8418. return the ASN.1 encoded representation of this object.
  8419. </member>
  8420. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataGenerator">
  8421. <remarks>
  8422. General class for generating a CMS enveloped-data message.
  8423. A simple example of usage.
  8424. <pre>
  8425. CmsEnvelopedDataGenerator fact = new CmsEnvelopedDataGenerator();
  8426. fact.AddKeyTransRecipient(cert);
  8427. CmsEnvelopedData data = fact.Generate(content, algorithm);
  8428. </pre>
  8429. </remarks>
  8430. </member>
  8431. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  8432. <summary>Constructor allowing specific source of randomness</summary>
  8433. <param name="random">Instance of <c>SecureRandom</c> to use.</param>
  8434. </member>
  8435. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessable,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.CipherKeyGenerator)">
  8436. <summary>
  8437. Generate an enveloped object that contains a CMS Enveloped Data
  8438. object using the passed in key generator.
  8439. </summary>
  8440. </member>
  8441. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessable,System.String)">
  8442. <summary>Generate an enveloped object that contains an CMS Enveloped Data object.</summary>
  8443. </member>
  8444. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessable,System.String,System.Int32)">
  8445. <summary>Generate an enveloped object that contains an CMS Enveloped Data object.</summary>
  8446. </member>
  8447. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataParser">
  8448. Parsing class for an CMS Enveloped Data object from an input stream.
  8449. <p>
  8450. Note: that because we are in a streaming mode only one recipient can be tried and it is important
  8451. that the methods on the parser are called in the appropriate order.
  8452. </p>
  8453. <p>
  8454. Example of use - assuming the first recipient matches the private key we have.
  8455. <pre>
  8456. CmsEnvelopedDataParser ep = new CmsEnvelopedDataParser(inputStream);
  8457. RecipientInformationStore recipients = ep.GetRecipientInfos();
  8458. Collection c = recipients.getRecipients();
  8459. Iterator it = c.iterator();
  8460. if (it.hasNext())
  8461. {
  8462. RecipientInformation recipient = (RecipientInformation)it.next();
  8463. CMSTypedStream recData = recipient.getContentStream(privateKey);
  8464. processDataStream(recData.getContentStream());
  8465. }
  8466. </pre>
  8467. Note: this class does not introduce buffering - if you are processing large files you should create
  8468. the parser with:
  8469. <pre>
  8470. CmsEnvelopedDataParser ep = new CmsEnvelopedDataParser(new BufferedInputStream(inputStream, bufSize));
  8471. </pre>
  8472. where bufSize is a suitably large buffer size.
  8473. </p>
  8474. </member>
  8475. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataParser.EncryptionAlgOid">
  8476. return the object identifier for the content encryption algorithm.
  8477. </member>
  8478. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataParser.EncryptionAlgParams">
  8479. return the ASN.1 encoded encryption algorithm parameters, or null if
  8480. there aren't any.
  8481. </member>
  8482. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataParser.GetRecipientInfos">
  8483. return a store of the intended recipients for this message
  8484. </member>
  8485. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataParser.GetUnprotectedAttributes">
  8486. return a table of the unprotected attributes indexed by
  8487. the OID of the attribute.
  8488. @throws IOException
  8489. </member>
  8490. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator">
  8491. General class for generating a CMS enveloped-data message stream.
  8492. <p>
  8493. A simple example of usage.
  8494. <pre>
  8495. CmsEnvelopedDataStreamGenerator edGen = new CmsEnvelopedDataStreamGenerator();
  8496. edGen.AddKeyTransRecipient(cert);
  8497. MemoryStream bOut = new MemoryStream();
  8498. Stream out = edGen.Open(
  8499. bOut, CMSEnvelopedDataGenerator.AES128_CBC);*
  8500. out.Write(data);
  8501. out.Close();
  8502. </pre>
  8503. </p>
  8504. </member>
  8505. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  8506. <summary>Constructor allowing specific source of randomness</summary>
  8507. <param name="random">Instance of <c>SecureRandom</c> to use.</param>
  8508. </member>
  8509. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.SetBufferSize(System.Int32)">
  8510. <summary>Set the underlying string size for encapsulated data.</summary>
  8511. <param name="bufferSize">Length of octet strings to buffer the data.</param>
  8512. </member>
  8513. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.SetBerEncodeRecipients(System.Boolean)">
  8514. <summary>Use a BER Set to store the recipient information.</summary>
  8515. </member>
  8516. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.Open(System.IO.Stream,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.CipherKeyGenerator)">
  8517. <summary>
  8518. Generate an enveloped object that contains an CMS Enveloped Data
  8519. object using the passed in key generator.
  8520. </summary>
  8521. </member>
  8522. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.Open(System.IO.Stream,System.String)">
  8523. generate an enveloped object that contains an CMS Enveloped Data object
  8524. @throws IOException
  8525. </member>
  8526. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.Open(System.IO.Stream,System.String,System.Int32)">
  8527. generate an enveloped object that contains an CMS Enveloped Data object
  8528. @throws IOException
  8529. </member>
  8530. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedGenerator">
  8531. General class for generating a CMS enveloped-data message.
  8532. A simple example of usage.
  8533. <pre>
  8534. CMSEnvelopedDataGenerator fact = new CMSEnvelopedDataGenerator();
  8535. fact.addKeyTransRecipient(cert);
  8536. CMSEnvelopedData data = fact.generate(content, algorithm, "BC");
  8537. </pre>
  8538. </member>
  8539. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  8540. <summary>Constructor allowing specific source of randomness</summary>
  8541. <param name="random">Instance of <c>SecureRandom</c> to use.</param>
  8542. </member>
  8543. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKeyTransRecipient(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  8544. add a recipient.
  8545. @param cert recipient's public key certificate
  8546. @exception ArgumentException if there is a problem with the certificate
  8547. </member>
  8548. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKeyTransRecipient(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[])">
  8549. add a recipient
  8550. @param key the public key used by the recipient
  8551. @param subKeyId the identifier for the recipient's public key
  8552. @exception ArgumentException if there is a problem with the key
  8553. </member>
  8554. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKekRecipient(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KeyParameter,System.Byte[])">
  8555. add a KEK recipient.
  8556. @param key the secret key to use for wrapping
  8557. @param keyIdentifier the byte string that identifies the key
  8558. </member>
  8559. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKekRecipient(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.KekIdentifier)">
  8560. add a KEK recipient.
  8561. @param key the secret key to use for wrapping
  8562. @param keyIdentifier the byte string that identifies the key
  8563. </member>
  8564. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKeyAgreementRecipient(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String)">
  8565. Add a key agreement based recipient.
  8566. @param agreementAlgorithm key agreement algorithm to use.
  8567. @param senderPrivateKey private key to initialise sender side of agreement with.
  8568. @param senderPublicKey sender public key to include with message.
  8569. @param recipientCert recipient's public key certificate.
  8570. @param cekWrapAlgorithm OID for key wrapping algorithm to use.
  8571. @exception SecurityUtilityException if the algorithm requested cannot be found
  8572. @exception InvalidKeyException if the keys are inappropriate for the algorithm specified
  8573. </member>
  8574. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKeyAgreementRecipients(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Collections.Generic.IEnumerable{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate},System.String)">
  8575. Add multiple key agreement based recipients (sharing a single KeyAgreeRecipientInfo structure).
  8576. @param agreementAlgorithm key agreement algorithm to use.
  8577. @param senderPrivateKey private key to initialise sender side of agreement with.
  8578. @param senderPublicKey sender public key to include with message.
  8579. @param recipientCerts recipients' public key certificates.
  8580. @param cekWrapAlgorithm OID for key wrapping algorithm to use.
  8581. @exception SecurityUtilityException if the algorithm requested cannot be found
  8582. @exception InvalidKeyException if the keys are inappropriate for the algorithm specified
  8583. </member>
  8584. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddRecipientInfoGenerator(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientInfoGenerator)">
  8585. <summary>
  8586. Add a generator to produce the recipient info required.
  8587. </summary>
  8588. <param name="recipientInfoGenerator">a generator of a recipient info object.</param>
  8589. </member>
  8590. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessable.Write(System.IO.Stream)">
  8591. <summary>
  8592. Generic routine to copy out the data we want processed.
  8593. </summary>
  8594. <remarks>
  8595. This routine may be called multiple times.
  8596. </remarks>
  8597. </member>
  8598. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessableByteArray">
  8599. a holding class for a byte array of data to be processed.
  8600. </member>
  8601. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessableFile">
  8602. a holding class for a file of data to be processed.
  8603. </member>
  8604. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData">
  8605. general class for handling a pkcs7-signature message.
  8606. A simple example of usage - note, in the example below the validity of
  8607. the certificate isn't verified, just the fact that one of the certs
  8608. matches the given signer...
  8609. <pre>
  8610. IX509Store certs = s.GetCertificates();
  8611. SignerInformationStore signers = s.GetSignerInfos();
  8612. foreach (SignerInformation signer in signers.GetSigners())
  8613. {
  8614. ArrayList certList = new ArrayList(certs.GetMatches(signer.SignerID));
  8615. X509Certificate cert = (X509Certificate) certList[0];
  8616. if (signer.Verify(cert.GetPublicKey()))
  8617. {
  8618. verified++;
  8619. }
  8620. }
  8621. </pre>
  8622. </member>
  8623. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.#ctor(System.Collections.Generic.IDictionary{System.String,System.Byte[]},System.Byte[])">
  8624. Content with detached signature, digests precomputed
  8625. @param hashes a map of precomputed digests for content indexed by name of hash.
  8626. @param sigBlock the signature object.
  8627. </member>
  8628. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessable,System.IO.Stream)">
  8629. base constructor - content with detached signature.
  8630. @param signedContent the content that was signed.
  8631. @param sigData the signature object.
  8632. </member>
  8633. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.#ctor(System.IO.Stream)">
  8634. base constructor - with encapsulated content
  8635. </member>
  8636. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.Version">
  8637. <summary>Return the version number for this object.</summary>
  8638. </member>
  8639. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.GetSignerInfos">
  8640. return the collection of signers that are associated with the
  8641. signatures for the message.
  8642. </member>
  8643. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.GetAttributeCertificates">
  8644. return a X509Store containing the attribute certificates, if any, contained
  8645. in this message.
  8646. @param type type of store to create
  8647. @return a store of attribute certificates
  8648. @exception NoSuchStoreException if the store type isn't available.
  8649. @exception CmsException if a general exception prevents creation of the X509Store
  8650. </member>
  8651. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.GetCertificates">
  8652. return a X509Store containing the public key certificates, if any, contained in this message.
  8653. @return a store of public key certificates
  8654. @exception NoSuchStoreException if the store type isn't available.
  8655. @exception CmsException if a general exception prevents creation of the X509Store
  8656. </member>
  8657. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.GetCrls">
  8658. return a X509Store containing CRLs, if any, contained in this message.
  8659. @return a store of CRLs
  8660. @exception NoSuchStoreException if the store type isn't available.
  8661. @exception CmsException if a general exception prevents creation of the X509Store
  8662. </member>
  8663. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.SignedContentType">
  8664. <summary>
  8665. Return the <c>DerObjectIdentifier</c> associated with the encapsulated
  8666. content info structure carried in the signed data.
  8667. </summary>
  8668. </member>
  8669. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.ContentInfo">
  8670. return the ContentInfo
  8671. </member>
  8672. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.GetEncoded">
  8673. return the ASN.1 encoded representation of this object.
  8674. </member>
  8675. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.GetEncoded(System.String)">
  8676. return the ASN.1 encoded representation of this object using the specified encoding.
  8677. @param encoding the ASN.1 encoding format to use ("BER" or "DER").
  8678. </member>
  8679. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.ReplaceSigners(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformationStore)">
  8680. Replace the signerinformation store associated with this
  8681. CmsSignedData object with the new one passed in. You would
  8682. probably only want to do this if you wanted to change the unsigned
  8683. attributes associated with a signer, or perhaps delete one.
  8684. @param signedData the signed data object to be used as a base.
  8685. @param signerInformationStore the new signer information store to use.
  8686. @return a new signed data object.
  8687. </member>
  8688. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData.ReplaceCertificatesAndCrls(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedData,Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.IStore{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate},Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.IStore{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl})">
  8689. Replace the certificate and CRL information associated with this
  8690. CmsSignedData object with the new one passed in.
  8691. @param signedData the signed data object to be used as a base.
  8692. @param x509Certs the new certificates to be used.
  8693. @param x509Crls the new CRLs to be used.
  8694. @return a new signed data object.
  8695. @exception CmsException if there is an error processing the stores
  8696. </member>
  8697. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator">
  8698. * general class for generating a pkcs7-signature message.
  8699. * <p>
  8700. * A simple example of usage.
  8701. *
  8702. * <pre>
  8703. * IX509Store certs...
  8704. * IX509Store crls...
  8705. * CmsSignedDataGenerator gen = new CmsSignedDataGenerator();
  8706. *
  8707. * gen.AddSigner(privKey, cert, CmsSignedGenerator.DigestSha1);
  8708. * gen.AddCertificates(certs);
  8709. * gen.AddCrls(crls);
  8710. *
  8711. * CmsSignedData data = gen.Generate(content);
  8712. * </pre>
  8713. * </p>
  8714. </member>
  8715. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  8716. <summary>Constructor allowing specific source of randomness</summary>
  8717. <param name="random">Instance of <c>SecureRandom</c> to use.</param>
  8718. </member>
  8719. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String)">
  8720. * add a signer - no attributes other than the default ones will be
  8721. * provided here.
  8722. *
  8723. * @param key signing key to use
  8724. * @param cert certificate containing corresponding public key
  8725. * @param digestOID digest algorithm OID
  8726. </member>
  8727. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String,System.String)">
  8728. add a signer, specifying the digest encryption algorithm to use - no attributes other than the default ones will be
  8729. provided here.
  8730. @param key signing key to use
  8731. @param cert certificate containing corresponding public key
  8732. @param encryptionOID digest encryption algorithm OID
  8733. @param digestOID digest algorithm OID
  8734. </member>
  8735. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String)">
  8736. add a signer - no attributes other than the default ones will be
  8737. provided here.
  8738. </member>
  8739. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,System.String)">
  8740. add a signer, specifying the digest encryption algorithm to use - no attributes other than the default ones will be
  8741. provided here.
  8742. </member>
  8743. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  8744. * add a signer with extra signed/unsigned attributes.
  8745. *
  8746. * @param key signing key to use
  8747. * @param cert certificate containing corresponding public key
  8748. * @param digestOID digest algorithm OID
  8749. * @param signedAttr table of attributes to be included in signature
  8750. * @param unsignedAttr table of attributes to be included as unsigned
  8751. </member>
  8752. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  8753. add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes.
  8754. @param key signing key to use
  8755. @param cert certificate containing corresponding public key
  8756. @param encryptionOID digest encryption algorithm OID
  8757. @param digestOID digest algorithm OID
  8758. @param signedAttr table of attributes to be included in signature
  8759. @param unsignedAttr table of attributes to be included as unsigned
  8760. </member>
  8761. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  8762. * add a signer with extra signed/unsigned attributes.
  8763. *
  8764. * @param key signing key to use
  8765. * @param subjectKeyID subjectKeyID of corresponding public key
  8766. * @param digestOID digest algorithm OID
  8767. * @param signedAttr table of attributes to be included in signature
  8768. * @param unsignedAttr table of attributes to be included as unsigned
  8769. </member>
  8770. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  8771. add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes.
  8772. @param key signing key to use
  8773. @param subjectKeyID subjectKeyID of corresponding public key
  8774. @param encryptionOID digest encryption algorithm OID
  8775. @param digestOID digest algorithm OID
  8776. @param signedAttr table of attributes to be included in signature
  8777. @param unsignedAttr table of attributes to be included as unsigned
  8778. </member>
  8779. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableGenerator,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  8780. add a signer with extra signed/unsigned attributes based on generators.
  8781. </member>
  8782. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableGenerator,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  8783. add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes based on generators.
  8784. </member>
  8785. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableGenerator,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  8786. add a signer with extra signed/unsigned attributes based on generators.
  8787. </member>
  8788. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableGenerator,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  8789. add a signer, including digest encryption algorithm, with extra signed/unsigned attributes based on generators.
  8790. </member>
  8791. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessable)">
  8792. generate a signed object that for a CMS Signed Data object
  8793. </member>
  8794. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.Generate(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessable,System.Boolean)">
  8795. generate a signed object that for a CMS Signed Data
  8796. object - if encapsulate is true a copy
  8797. of the message will be included in the signature. The content type
  8798. is set according to the OID represented by the string signedContentType.
  8799. </member>
  8800. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsProcessable,System.Boolean)">
  8801. generate a signed object that for a CMS Signed Data
  8802. object - if encapsulate is true a copy
  8803. of the message will be included in the signature with the
  8804. default content type "data".
  8805. </member>
  8806. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataGenerator.GenerateCounterSigners(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation)">
  8807. generate a set of one or more SignerInformation objects representing counter signatures on
  8808. the passed in SignerInformation object.
  8809. @param signer the signer to be countersigned
  8810. @param sigProvider the provider to be used for counter signing.
  8811. @return a store containing the signers.
  8812. </member>
  8813. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataParser">
  8814. Parsing class for an CMS Signed Data object from an input stream.
  8815. <p>
  8816. Note: that because we are in a streaming mode only one signer can be tried and it is important
  8817. that the methods on the parser are called in the appropriate order.
  8818. </p>
  8819. <p>
  8820. A simple example of usage for an encapsulated signature.
  8821. </p>
  8822. <p>
  8823. Two notes: first, in the example below the validity of
  8824. the certificate isn't verified, just the fact that one of the certs
  8825. matches the given signer, and, second, because we are in a streaming
  8826. mode the order of the operations is important.
  8827. </p>
  8828. <pre>
  8829. CmsSignedDataParser sp = new CmsSignedDataParser(encapSigData);
  8830. sp.GetSignedContent().Drain();
  8831. IX509Store certs = sp.GetCertificates();
  8832. SignerInformationStore signers = sp.GetSignerInfos();
  8833. foreach (SignerInformation signer in signers.GetSigners())
  8834. {
  8835. ArrayList certList = new ArrayList(certs.GetMatches(signer.SignerID));
  8836. X509Certificate cert = (X509Certificate) certList[0];
  8837. Console.WriteLine("verify returns: " + signer.Verify(cert));
  8838. }
  8839. </pre>
  8840. Note also: this class does not introduce buffering - if you are processing large files you should create
  8841. the parser with:
  8842. <pre>
  8843. CmsSignedDataParser ep = new CmsSignedDataParser(new BufferedInputStream(encapSigData, bufSize));
  8844. </pre>
  8845. where bufSize is a suitably large buffer size.
  8846. </member>
  8847. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataParser.#ctor(System.IO.Stream)">
  8848. base constructor - with encapsulated content
  8849. </member>
  8850. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataParser.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsTypedStream,System.IO.Stream)">
  8851. base constructor
  8852. @param signedContent the content that was signed.
  8853. @param sigData the signature object.
  8854. </member>
  8855. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataParser.Version">
  8856. Return the version number for the SignedData object
  8857. @return the version number
  8858. </member>
  8859. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataParser.GetSignerInfos">
  8860. return the collection of signers that are associated with the
  8861. signatures for the message.
  8862. @throws CmsException
  8863. </member>
  8864. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataParser.GetAttributeCertificates">
  8865. return a X509Store containing the attribute certificates, if any, contained
  8866. in this message.
  8867. @param type type of store to create
  8868. @return a store of attribute certificates
  8869. @exception org.bouncycastle.x509.NoSuchStoreException if the store type isn't available.
  8870. @exception CmsException if a general exception prevents creation of the X509Store
  8871. </member>
  8872. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataParser.GetCertificates">
  8873. return a X509Store containing the public key certificates, if any, contained
  8874. in this message.
  8875. @param type type of store to create
  8876. @return a store of public key certificates
  8877. @exception NoSuchStoreException if the store type isn't available.
  8878. @exception CmsException if a general exception prevents creation of the X509Store
  8879. </member>
  8880. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataParser.GetCrls">
  8881. return a X509Store containing CRLs, if any, contained
  8882. in this message.
  8883. @param type type of store to create
  8884. @return a store of CRLs
  8885. @exception NoSuchStoreException if the store type isn't available.
  8886. @exception CmsException if a general exception prevents creation of the X509Store
  8887. </member>
  8888. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataParser.SignedContentType">
  8889. <summary>
  8890. Return the <c>DerObjectIdentifier</c> associated with the encapsulated
  8891. content info structure carried in the signed data.
  8892. </summary>
  8893. </member>
  8894. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataParser.ReplaceSigners(System.IO.Stream,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformationStore,System.IO.Stream)">
  8895. Replace the signerinformation store associated with the passed
  8896. in message contained in the stream original with the new one passed in.
  8897. You would probably only want to do this if you wanted to change the unsigned
  8898. attributes associated with a signer, or perhaps delete one.
  8899. <p>
  8900. The output stream is returned unclosed.
  8901. </p>
  8902. @param original the signed data stream to be used as a base.
  8903. @param signerInformationStore the new signer information store to use.
  8904. @param out the stream to Write the new signed data object to.
  8905. @return out.
  8906. </member>
  8907. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataParser.ReplaceCertificatesAndCrls(System.IO.Stream,Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.IStore{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate},Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.IStore{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl},Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.IStore{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificate},System.IO.Stream)">
  8908. Replace the certificate and CRL information associated with this
  8909. CMSSignedData object with the new one passed in.
  8910. <p>
  8911. The output stream is returned unclosed.
  8912. </p>
  8913. @param original the signed data stream to be used as a base.
  8914. @param certsAndCrls the new certificates and CRLs to be used.
  8915. @param out the stream to Write the new signed data object to.
  8916. @return out.
  8917. @exception CmsException if there is an error processing the CertStore
  8918. </member>
  8919. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator">
  8920. General class for generating a pkcs7-signature message stream.
  8921. <p>
  8922. A simple example of usage.
  8923. </p>
  8924. <pre>
  8925. IX509Store certs...
  8926. CmsSignedDataStreamGenerator gen = new CmsSignedDataStreamGenerator();
  8927. gen.AddSigner(privateKey, cert, CmsSignedDataStreamGenerator.DIGEST_SHA1);
  8928. gen.AddCertificates(certs);
  8929. Stream sigOut = gen.Open(bOut);
  8930. sigOut.Write(Encoding.UTF8.GetBytes("Hello World!"));
  8931. sigOut.Close();
  8932. </pre>
  8933. </member>
  8934. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  8935. <summary>Constructor allowing specific source of randomness</summary>
  8936. <param name="random">Instance of <c>SecureRandom</c> to use.</param>
  8937. </member>
  8938. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.SetBufferSize(System.Int32)">
  8939. Set the underlying string size for encapsulated data
  8940. @param bufferSize length of octet strings to buffer the data.
  8941. </member>
  8942. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String)">
  8943. add a signer - no attributes other than the default ones will be
  8944. provided here.
  8945. @throws NoSuchAlgorithmException
  8946. @throws InvalidKeyException
  8947. </member>
  8948. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String,System.String)">
  8949. add a signer, specifying the digest encryption algorithm - no attributes other than the default ones will be
  8950. provided here.
  8951. @throws NoSuchProviderException
  8952. @throws NoSuchAlgorithmException
  8953. @throws InvalidKeyException
  8954. </member>
  8955. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  8956. add a signer with extra signed/unsigned attributes.
  8957. @throws NoSuchAlgorithmException
  8958. @throws InvalidKeyException
  8959. </member>
  8960. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  8961. add a signer with extra signed/unsigned attributes - specifying digest
  8962. encryption algorithm.
  8963. @throws NoSuchProviderException
  8964. @throws NoSuchAlgorithmException
  8965. @throws InvalidKeyException
  8966. </member>
  8967. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String)">
  8968. add a signer - no attributes other than the default ones will be
  8969. provided here.
  8970. @throws NoSuchAlgorithmException
  8971. @throws InvalidKeyException
  8972. </member>
  8973. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,System.String)">
  8974. add a signer - no attributes other than the default ones will be
  8975. provided here.
  8976. @throws NoSuchProviderException
  8977. @throws NoSuchAlgorithmException
  8978. @throws InvalidKeyException
  8979. </member>
  8980. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  8981. add a signer with extra signed/unsigned attributes.
  8982. @throws NoSuchAlgorithmException
  8983. @throws InvalidKeyException
  8984. </member>
  8985. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.Open(System.IO.Stream)">
  8986. generate a signed object that for a CMS Signed Data object
  8987. </member>
  8988. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.Open(System.IO.Stream,System.Boolean)">
  8989. generate a signed object that for a CMS Signed Data
  8990. object - if encapsulate is true a copy
  8991. of the message will be included in the signature with the
  8992. default content type "data".
  8993. </member>
  8994. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.Open(System.IO.Stream,System.Boolean,System.IO.Stream)">
  8995. generate a signed object that for a CMS Signed Data
  8996. object using the given provider - if encapsulate is true a copy
  8997. of the message will be included in the signature with the
  8998. default content type "data". If dataOutputStream is non null the data
  8999. being signed will be written to the stream as it is processed.
  9000. @param out stream the CMS object is to be written to.
  9001. @param encapsulate true if data should be encapsulated.
  9002. @param dataOutputStream output stream to copy the data being signed to.
  9003. </member>
  9004. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.Open(System.IO.Stream,System.String,System.Boolean)">
  9005. generate a signed object that for a CMS Signed Data
  9006. object - if encapsulate is true a copy
  9007. of the message will be included in the signature. The content type
  9008. is set according to the OID represented by the string signedContentType.
  9009. </member>
  9010. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.Open(System.IO.Stream,System.String,System.Boolean,System.IO.Stream)">
  9011. generate a signed object that for a CMS Signed Data
  9012. object using the given provider - if encapsulate is true a copy
  9013. of the message will be included in the signature. The content type
  9014. is set according to the OID represented by the string signedContentType.
  9015. @param out stream the CMS object is to be written to.
  9016. @param signedContentType OID for data to be signed.
  9017. @param encapsulate true if data should be encapsulated.
  9018. @param dataOutputStream output stream to copy the data being signed to.
  9019. </member>
  9020. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedGenerator.Data">
  9021. Default type for the signed data.
  9022. </member>
  9023. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  9024. <summary>Constructor allowing specific source of randomness</summary>
  9025. <param name="random">Instance of <c>SecureRandom</c> to use.</param>
  9026. </member>
  9027. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedGenerator.AddSigners(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformationStore)">
  9028. Add a store of precalculated signers to the generator.
  9029. @param signerStore store of signers
  9030. </member>
  9031. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedGenerator.GetGeneratedDigests">
  9032. Return a map of oids and byte arrays representing the digests calculated on the content during
  9033. the last generate.
  9034. @return a map of oids (as string objects) and byte[] representing digests.
  9035. </member>
  9036. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedHelper.GetDigestAlgName(System.String)">
  9037. Return the digest algorithm using one of the standard JCA string
  9038. representations rather than the algorithm identifier (if possible).
  9039. </member>
  9040. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsSignedHelper.GetEncryptionAlgName(System.String)">
  9041. Return the digest encryption algorithm using one of the standard
  9042. JCA string representations rather than the algorithm identifier (if
  9043. possible).
  9044. </member>
  9045. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.DefaultAuthenticatedAttributeTableGenerator">
  9046. Default authenticated attributes generator.
  9047. </member>
  9048. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.DefaultAuthenticatedAttributeTableGenerator.#ctor">
  9049. Initialise to use all defaults
  9050. </member>
  9051. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.DefaultAuthenticatedAttributeTableGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  9052. Initialise with some extra attributes or overrides.
  9053. @param attributeTable initial attribute table to use.
  9054. </member>
  9055. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.DefaultAuthenticatedAttributeTableGenerator.CreateStandardAttributeTable(System.Collections.Generic.IDictionary{Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableParameter,System.Object})">
  9056. Create a standard attribute table from the passed in parameters - this will
  9057. normally include contentType and messageDigest. If the constructor
  9058. using an AttributeTable was used, entries in it for contentType and
  9059. messageDigest will override the generated ones.
  9060. @param parameters source parameters for table generation.
  9061. @return a filled in IDictionary of attributes.
  9062. </member>
  9063. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.DefaultAuthenticatedAttributeTableGenerator.GetAttributes(System.Collections.Generic.IDictionary{Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableParameter,System.Object})">
  9064. @param parameters source parameters
  9065. @return the populated attribute table
  9066. </member>
  9067. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.DefaultSignedAttributeTableGenerator">
  9068. Default signed attributes generator.
  9069. </member>
  9070. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.DefaultSignedAttributeTableGenerator.#ctor">
  9071. Initialise to use all defaults
  9072. </member>
  9073. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.DefaultSignedAttributeTableGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  9074. Initialise with some extra attributes or overrides.
  9075. @param attributeTable initial attribute table to use.
  9076. </member>
  9077. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.DefaultSignedAttributeTableGenerator.CreateStandardAttributeTable(System.Collections.Generic.IDictionary{Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableParameter,System.Object})">
  9078. Create a standard attribute table from the passed in parameters - this will
  9079. normally include contentType, signingTime, and messageDigest. If the constructor
  9080. using an AttributeTable was used, entries in it for contentType, signingTime, and
  9081. messageDigest will override the generated ones.
  9082. @param parameters source parameters for table generation.
  9083. @return a filled in Dictionary of attributes.
  9084. </member>
  9085. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.DefaultSignedAttributeTableGenerator.GetAttributes(System.Collections.Generic.IDictionary{Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableParameter,System.Object})">
  9086. @param parameters source parameters
  9087. @return the populated attribute table
  9088. </member>
  9089. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.KekRecipientInformation">
  9090. the RecipientInfo class for a recipient who has been sent a message
  9091. encrypted using a secret key known to the other side.
  9092. </member>
  9093. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.KekRecipientInformation.GetContentStream(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  9094. decrypt the content and return an input stream.
  9095. </member>
  9096. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.KeyAgreeRecipientInformation">
  9097. the RecipientInfo class for a recipient who has been sent a message
  9098. encrypted using key agreement.
  9099. </member>
  9100. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.KeyAgreeRecipientInformation.GetContentStream(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  9101. decrypt the content and return an input stream.
  9102. </member>
  9103. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.KeyTransRecipientInformation">
  9104. the KeyTransRecipientInformation class for a recipient who has been sent a secret
  9105. key encrypted using their public key that needs to be used to
  9106. extract the message.
  9107. </member>
  9108. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.KeyTransRecipientInformation.GetContentStream(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  9109. decrypt the content and return it as a byte array.
  9110. </member>
  9111. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.OriginatorID">
  9112. a basic index for an originator.
  9113. </member>
  9114. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.OriginatorInformation.GetCertificates">
  9115. Return the certificates stored in the underlying OriginatorInfo object.
  9116. @return a Store of X509CertificateHolder objects.
  9117. </member>
  9118. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.OriginatorInformation.GetCrls">
  9119. Return the CRLs stored in the underlying OriginatorInfo object.
  9120. @return a Store of X509CRLHolder objects.
  9121. </member>
  9122. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.OriginatorInformation.ToAsn1Structure">
  9123. Return the underlying ASN.1 object defining this SignerInformation object.
  9124. @return a OriginatorInfo.
  9125. </member>
  9126. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.PasswordRecipientInformation">
  9127. the RecipientInfo class for a recipient who has been sent a message
  9128. encrypted using a password.
  9129. </member>
  9130. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.PasswordRecipientInformation.KeyDerivationAlgorithm">
  9131. return the object identifier for the key derivation algorithm, or null
  9132. if there is none present.
  9133. @return OID for key derivation algorithm, if present.
  9134. </member>
  9135. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.PasswordRecipientInformation.GetContentStream(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  9136. decrypt the content and return an input stream.
  9137. </member>
  9138. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.Pkcs5Scheme2PbeKey">
  9139. <summary>
  9140. PKCS5 scheme-2 - password converted to bytes assuming ASCII.
  9141. </summary>
  9142. </member>
  9143. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.Pkcs5Scheme2Utf8PbeKey">
  9144. PKCS5 scheme-2 - password converted to bytes using UTF-8.
  9145. </member>
  9146. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientInfoGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  9147. <summary>
  9148. Generate a RecipientInfo object for the given key.
  9149. </summary>
  9150. <param name="contentEncryptionKey">
  9151. A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KeyParameter"/>
  9152. </param>
  9153. <param name="random">
  9154. A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom"/>
  9155. </param>
  9156. <returns>
  9157. A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.RecipientInfo"/>
  9158. </returns>
  9159. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.GeneralSecurityException"></exception>
  9160. </member>
  9161. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientInformation.KeyEncryptionAlgOid">
  9162. * return the object identifier for the key encryption algorithm.
  9163. *
  9164. * @return OID for key encryption algorithm.
  9165. </member>
  9166. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientInformation.KeyEncryptionAlgParams">
  9167. * return the ASN.1 encoded key encryption algorithm parameters, or null if
  9168. * there aren't any.
  9169. *
  9170. * @return ASN.1 encoding of key encryption algorithm parameters.
  9171. </member>
  9172. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientInformation.GetMac">
  9173. Return the MAC calculated for the content stream. Note: this call is only meaningful once all
  9174. the content has been read.
  9175. @return byte array containing the mac.
  9176. </member>
  9177. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientInformationStore.GetFirstRecipient(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientID)">
  9178. Return the first RecipientInformation object that matches the
  9179. passed in selector. Null if there are no matches.
  9180. @param selector to identify a recipient
  9181. @return a single RecipientInformation object. Null if none matches.
  9182. </member>
  9183. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientInformationStore.Count">
  9184. Return the number of recipients in the collection.
  9185. @return number of recipients identified.
  9186. </member>
  9187. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientInformationStore.GetRecipients">
  9188. Return all recipients in the collection
  9189. @return a collection of recipients.
  9190. </member>
  9191. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientInformationStore.GetRecipients(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientID)">
  9192. Return possible empty collection with recipients matching the passed in RecipientID
  9193. @param selector a recipient id to select against.
  9194. @return a collection of RecipientInformation objects.
  9195. </member>
  9196. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerID">
  9197. a basic index for a signer.
  9198. </member>
  9199. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInfoGeneratorBuilder.SetDirectSignature(System.Boolean)">
  9200. If the passed in flag is true, the signer signature will be based on the data, not
  9201. a collection of signed attributes, and no signed attributes will be included.
  9202. @return the builder object
  9203. </member>
  9204. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInfoGeneratorBuilder.WithSignedAttributeGenerator(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  9205. Provide a custom signed attribute generator.
  9206. @param signedGen a generator of signed attributes.
  9207. @return the builder object
  9208. </member>
  9209. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInfoGeneratorBuilder.WithUnsignedAttributeGenerator(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  9210. Provide a generator of unsigned attributes.
  9211. @param unsignedGen a generator for signed attributes.
  9212. @return the builder object
  9213. </member>
  9214. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInfoGeneratorBuilder.Build(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  9215. Build a generator with the passed in X.509 certificate issuer and serial number as the signerIdentifier.
  9216. @param contentSigner operator for generating the final signature in the SignerInfo with.
  9217. @param certificate X.509 certificate related to the contentSigner.
  9218. @return a SignerInfoGenerator
  9219. @throws OperatorCreationException if the generator cannot be built.
  9220. </member>
  9221. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInfoGeneratorBuilder.Build(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory,System.Byte[])">
  9222. Build a generator with the passed in subjectKeyIdentifier as the signerIdentifier. If used you should
  9223. try to follow the calculation described in RFC 5280 section 4.2.1.2.
  9224. @param signerFactory operator factory for generating the final signature in the SignerInfo with.
  9225. @param subjectKeyIdentifier key identifier to identify the public key for verifying the signature.
  9226. @return a SignerInfoGenerator
  9227. </member>
  9228. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation">
  9229. an expanded SignerInfo block from a CMS Signed message
  9230. </member>
  9231. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation)">
  9232. Protected constructor. In some cases clients have their own idea about how to encode
  9233. the signed attributes and calculate the signature. This constructor is to allow developers
  9234. to deal with that by extending off the class and overriding e.g. SignedAttributes property.
  9235. @param baseInfo the SignerInformation to base this one on.
  9236. </member>
  9237. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.Version">
  9238. return the version number for this objects underlying SignerInfo structure.
  9239. </member>
  9240. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.DigestAlgOid">
  9241. return the object identifier for the signature.
  9242. </member>
  9243. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.DigestAlgParams">
  9244. return the signature parameters, or null if there aren't any.
  9245. </member>
  9246. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.GetContentDigest">
  9247. return the content digest that was calculated during verification.
  9248. </member>
  9249. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.EncryptionAlgOid">
  9250. return the object identifier for the signature.
  9251. </member>
  9252. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.EncryptionAlgParams">
  9253. return the signature/encryption algorithm parameters, or null if
  9254. there aren't any.
  9255. </member>
  9256. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.SignedAttributes">
  9257. return a table of the signed attributes - indexed by
  9258. the OID of the attribute.
  9259. </member>
  9260. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.UnsignedAttributes">
  9261. return a table of the unsigned attributes indexed by
  9262. the OID of the attribute.
  9263. </member>
  9264. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.GetSignature">
  9265. return the encoded signature
  9266. </member>
  9267. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.GetCounterSignatures">
  9268. Return a SignerInformationStore containing the counter signatures attached to this
  9269. signer. If no counter signatures are present an empty store is returned.
  9270. </member>
  9271. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.GetEncodedSignedAttributes">
  9272. return the DER encoding of the signed attributes.
  9273. @throws IOException if an encoding error occurs.
  9274. </member>
  9275. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.Verify(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  9276. verify that the given public key successfully handles and confirms the
  9277. signature associated with this signer.
  9278. </member>
  9279. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.Verify(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  9280. verify that the given certificate successfully handles and confirms
  9281. the signature associated with this signer and, if a signingTime
  9282. attribute is available, that the certificate was valid at the time the
  9283. signature was generated.
  9284. </member>
  9285. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.ToSignerInfo">
  9286. Return the base ASN.1 CMS structure that this object contains.
  9287. @return an object containing a CMS SignerInfo structure.
  9288. </member>
  9289. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.ReplaceUnsignedAttributes(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  9290. Return a signer information object with the passed in unsigned
  9291. attributes replacing the ones that are current associated with
  9292. the object passed in.
  9293. @param signerInformation the signerInfo to be used as the basis.
  9294. @param unsignedAttributes the unsigned attributes to add.
  9295. @return a copy of the original SignerInformationObject with the changed attributes.
  9296. </member>
  9297. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation.AddCounterSigners(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation,Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformationStore)">
  9298. Return a signer information object with passed in SignerInformationStore representing counter
  9299. signatures attached as an unsigned attribute.
  9300. @param signerInformation the signerInfo to be used as the basis.
  9301. @param counterSigners signer info objects carrying counter signature.
  9302. @return a copy of the original SignerInformationObject with the changed attributes.
  9303. </member>
  9304. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformationStore.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation)">
  9305. Create a store containing a single SignerInformation object.
  9306. @param signerInfo the signer information to contain.
  9307. </member>
  9308. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformationStore.#ctor(System.Collections.Generic.IEnumerable{Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation})">
  9309. Create a store containing a collection of SignerInformation objects.
  9310. @param signerInfos a collection signer information objects to contain.
  9311. </member>
  9312. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformationStore.GetFirstSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerID)">
  9313. Return the first SignerInformation object that matches the
  9314. passed in selector. Null if there are no matches.
  9315. @param selector to identify a signer
  9316. @return a single SignerInformation object. Null if none matches.
  9317. </member>
  9318. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformationStore.Count">
  9319. <summary>The number of signers in the collection.</summary>
  9320. </member>
  9321. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformationStore.GetSigners">
  9322. <returns>An ICollection of all signers in the collection</returns>
  9323. </member>
  9324. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformationStore.GetSigners(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerID)">
  9325. Return possible empty collection with signers matching the passed in SignerID
  9326. @param selector a signer id to select against.
  9327. @return a collection of SignerInformation objects.
  9328. </member>
  9329. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SimpleAttributeTableGenerator">
  9330. Basic generator that just returns a preconstructed attribute table
  9331. </member>
  9332. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.AuthenticatorControl">
  9333. <summary>
  9334. Carrier for an authenticator control.
  9335. </summary>
  9336. </member>
  9337. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.AuthenticatorControl.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerUtf8String)">
  9338. <summary>
  9339. Basic constructor - build from a UTF-8 string representing the token.
  9340. </summary>
  9341. <param name="token">UTF-8 string representing the token.</param>
  9342. </member>
  9343. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.AuthenticatorControl.#ctor(System.String)">
  9344. <summary>
  9345. Basic constructor - build from a string representing the token.
  9346. </summary>
  9347. <param name="token">string representing the token.</param>
  9348. </member>
  9349. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.AuthenticatorControl.Type">
  9350. <summary>
  9351. Return the type of this control.
  9352. </summary>
  9353. </member>
  9354. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.AuthenticatorControl.Value">
  9355. <summary>
  9356. Return the token associated with this control (a UTF8String).
  9357. </summary>
  9358. </member>
  9359. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CertificateRequestMessage.#ctor(System.Byte[])">
  9360. <summary>
  9361. Create a CertificateRequestMessage from the passed in bytes.
  9362. </summary>
  9363. <param name="encoded">BER/DER encoding of the CertReqMsg structure.</param>
  9364. </member>
  9365. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CertificateRequestMessage.ToAsn1Structure">
  9366. <summary>
  9367. Return the underlying ASN.1 object defining this CertificateRequestMessage object.
  9368. </summary>
  9369. <returns>A CertReqMsg</returns>
  9370. </member>
  9371. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CertificateRequestMessage.GetCertTemplate">
  9372. <summary>
  9373. Return the certificate template contained in this message.
  9374. </summary>
  9375. <returns>a CertTemplate structure.</returns>
  9376. </member>
  9377. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CertificateRequestMessage.HasControls">
  9378. <summary>
  9379. Return whether or not this request has control values associated with it.
  9380. </summary>
  9381. <returns>true if there are control values present, false otherwise.</returns>
  9382. </member>
  9383. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CertificateRequestMessage.HasControl(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  9384. <summary>
  9385. Return whether or not this request has a specific type of control value.
  9386. </summary>
  9387. <param name="objectIdentifier">the type OID for the control value we are checking for.</param>
  9388. <returns>true if a control value of type is present, false otherwise.</returns>
  9389. </member>
  9390. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CertificateRequestMessage.GetControl(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  9391. <summary>
  9392. Return a control value of the specified type.
  9393. </summary>
  9394. <param name="type">the type OID for the control value we are checking for.</param>
  9395. <returns>the control value if present, null otherwise.</returns>
  9396. </member>
  9397. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CertificateRequestMessage.HasProofOfPossession">
  9398. <summary>
  9399. Return whether or not this request message has a proof-of-possession field in it.
  9400. </summary>
  9401. <returns>true if proof-of-possession is present, false otherwise.</returns>
  9402. </member>
  9403. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CertificateRequestMessage.ProofOfPossession">
  9404. <summary>
  9405. Return the type of the proof-of-possession this request message provides.
  9406. </summary>
  9407. <returns>one of: popRaVerified, popSigningKey, popKeyEncipherment, popKeyAgreement</returns>
  9408. </member>
  9409. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CertificateRequestMessage.HasSigningKeyProofOfPossessionWithPkMac">
  9410. <summary>
  9411. Return whether or not the proof-of-possession (POP) is of the type popSigningKey and
  9412. it has a public key MAC associated with it.
  9413. </summary>
  9414. <returns>true if POP is popSigningKey and a PKMAC is present, false otherwise.</returns>
  9415. </member>
  9416. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CertificateRequestMessage.IsValidSigningKeyPop(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifierFactoryProvider)">
  9417. <summary>
  9418. Return whether or not a signing key proof-of-possession (POP) is valid.
  9419. </summary>
  9420. <param name="verifierProvider">a provider that can produce content verifiers for the signature contained in this POP.</param>
  9421. <returns>true if the POP is valid, false otherwise.</returns>
  9422. <exception cref="T:System.InvalidOperationException">if there is a problem in verification or content verifier creation.</exception>
  9423. <exception cref="T:System.InvalidOperationException">if POP not appropriate.</exception>
  9424. </member>
  9425. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CertificateRequestMessage.GetEncoded">
  9426. <summary>
  9427. Return the ASN.1 encoding of the certReqMsg we wrap.
  9428. </summary>
  9429. <returns>a byte array containing the binary encoding of the certReqMsg.</returns>
  9430. </member>
  9431. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.EncryptedValueBuilder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IKeyWrapper,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherBuilderWithKey)">
  9432. Create a builder that makes EncryptedValue structures.
  9433. <param name="wrapper">wrapper a wrapper for key used to encrypt the actual data contained in the EncryptedValue.</param>
  9434. <param name="encryptor">encryptor an output encryptor to encrypt the actual data contained in the EncryptedValue. </param>
  9435. </member>
  9436. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.EncryptedValueBuilder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IKeyWrapper,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherBuilderWithKey,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.IEncryptedValuePadder)">
  9437. Create a builder that makes EncryptedValue structures with fixed length blocks padded using the passed in padder.
  9438. <param name="wrapper">a wrapper for key used to encrypt the actual data contained in the EncryptedValue.</param>
  9439. <param name="encryptor">encryptor an output encryptor to encrypt the actual data contained in the EncryptedValue.</param>
  9440. <param name="padder">padder a padder to ensure that the EncryptedValue created will always be a constant length.</param>
  9441. </member>
  9442. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.EncryptedValueBuilder.Build(System.Char[])">
  9443. Build an EncryptedValue structure containing the passed in pass phrase.
  9444. <param name="revocationPassphrase">a revocation pass phrase.</param>
  9445. <returns>an EncryptedValue containing the encrypted pass phrase.</returns>
  9446. </member>
  9447. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.EncryptedValueBuilder.Build(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  9448. <summary>
  9449. Build an EncryptedValue structure containing the certificate contained in
  9450. the passed in holder.
  9451. </summary>
  9452. <param name="holder">a holder containing a certificate.</param>
  9453. <returns>an EncryptedValue containing the encrypted certificate.</returns>
  9454. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CrmfException">on a failure to encrypt the data, or wrap the symmetric key for this value.</exception>
  9455. </member>
  9456. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.EncryptedValueBuilder.Build(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo)">
  9457. <summary>
  9458. Build an EncryptedValue structure containing the private key contained in
  9459. the passed info structure.
  9460. </summary>
  9461. <param name="privateKeyInfo">a PKCS#8 private key info structure.</param>
  9462. <returns>an EncryptedValue containing an EncryptedPrivateKeyInfo structure.</returns>
  9463. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.CrmfException">on a failure to encrypt the data, or wrap the symmetric key for this value.</exception>
  9464. </member>
  9465. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.IControl">
  9466. <summary>
  9467. Generic interface for a CertificateRequestMessage control value.
  9468. </summary>
  9469. </member>
  9470. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.IControl.Type">
  9471. <summary>
  9472. Return the type of this control.
  9473. </summary>
  9474. </member>
  9475. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.IControl.Value">
  9476. <summary>
  9477. Return the value contained in this control object.
  9478. </summary>
  9479. </member>
  9480. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.IEncryptedValuePadder">
  9481. <summary>
  9482. An encrypted value padder is used to make sure that prior to a value been
  9483. encrypted the data is padded to a standard length.
  9484. </summary>
  9485. </member>
  9486. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.IEncryptedValuePadder.GetPaddedData(System.Byte[])">
  9487. <summary>Return a byte array of padded data.</summary>
  9488. <param name="data">the data to be padded.</param>
  9489. <returns>a padded byte array containing data.</returns>
  9490. </member>
  9491. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.IEncryptedValuePadder.GetUnpaddedData(System.Byte[])">
  9492. <summary>Return a byte array of with padding removed.</summary>
  9493. <param name="paddedData">the data to be padded.</param>
  9494. <returns>an array containing the original unpadded data.</returns>
  9495. </member>
  9496. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PkiArchiveControl.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.PkiArchiveOptions)">
  9497. <summary>
  9498. Basic constructor - build from an PKIArchiveOptions structure.
  9499. </summary>
  9500. <param name="pkiArchiveOptions">the ASN.1 structure that will underlie this control.</param>
  9501. </member>
  9502. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PkiArchiveControl.Type">
  9503. <summary>
  9504. Return the type of this control.
  9505. </summary>
  9506. <returns>CRMFObjectIdentifiers.id_regCtrl_pkiArchiveOptions</returns>
  9507. </member>
  9508. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PkiArchiveControl.Value">
  9509. <summary>
  9510. Return the underlying ASN.1 object.
  9511. </summary>
  9512. <returns>a PKIArchiveOptions structure.</returns>
  9513. </member>
  9514. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PkiArchiveControl.ArchiveType">
  9515. <summary>
  9516. Return the archive control type, one of: encryptedPrivKey,keyGenParameters,or archiveRemGenPrivKey.
  9517. </summary>
  9518. <returns>the archive control type.</returns>
  9519. </member>
  9520. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PkiArchiveControl.EnvelopedData">
  9521. <summary>
  9522. Return whether this control contains enveloped data.
  9523. </summary>
  9524. <returns>true if the control contains enveloped data, false otherwise.</returns>
  9525. </member>
  9526. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PkiArchiveControl.GetEnvelopedData">
  9527. <summary>
  9528. Return the enveloped data structure contained in this control.
  9529. </summary>
  9530. <returns>a CMSEnvelopedData object.</returns>
  9531. </member>
  9532. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PkiArchiveControlBuilder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  9533. <summary>
  9534. Basic constructor - specify the contents of the PKIArchiveControl structure.
  9535. </summary>
  9536. <param name="privateKeyInfo">the private key to be archived.</param>
  9537. <param name="generalName">the general name to be associated with the private key.</param>
  9538. </member>
  9539. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PkiArchiveControlBuilder.AddRecipientGenerator(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.RecipientInfoGenerator)">
  9540. <summary>Add a recipient generator to this control.</summary>
  9541. <param name="recipientGen"> recipient generator created for a specific recipient.</param>
  9542. <returns>this builder object.</returns>
  9543. </member>
  9544. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PkiArchiveControlBuilder.Build(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherBuilderWithKey)">
  9545. <summary>Build the PKIArchiveControl using the passed in encryptor to encrypt its contents.</summary>
  9546. <param name="contentEncryptor">a suitable content encryptor.</param>
  9547. <returns>a PKIArchiveControl object.</returns>
  9548. </member>
  9549. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PKMacBuilder.#ctor">
  9550. <summary>
  9551. Default, IterationCount = 1000, OIW=IdSha1, Mac=HmacSHA1
  9552. </summary>
  9553. </member>
  9554. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PKMacBuilder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.IPKMacPrimitivesProvider)">
  9555. <summary>
  9556. Defaults with IPKMacPrimitivesProvider
  9557. </summary>
  9558. <param name="provider"></param>
  9559. </member>
  9560. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PKMacBuilder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.IPKMacPrimitivesProvider,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier)">
  9561. <summary>
  9562. Create.
  9563. </summary>
  9564. <param name="provider">The Mac provider</param>
  9565. <param name="digestAlgorithmIdentifier">Digest Algorithm Id</param>
  9566. <param name="macAlgorithmIdentifier">Mac Algorithm Id</param>
  9567. </member>
  9568. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PKMacBuilder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.IPKMacPrimitivesProvider,System.Int32)">
  9569. <summary>
  9570. Create a PKMAC builder enforcing a ceiling on the maximum iteration count.
  9571. </summary>
  9572. <param name="provider">supporting calculator</param>
  9573. <param name="maxIterations">max allowable value for iteration count.</param>
  9574. </member>
  9575. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PKMacBuilder.SetSaltLength(System.Int32)">
  9576. Set the salt length in octets.
  9577. @param saltLength length in octets of the salt to be generated.
  9578. @return the generator
  9579. </member>
  9580. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PKMacBuilder.SetIterationCount(System.Int32)">
  9581. <summary>
  9582. Set the iteration count.
  9583. </summary>
  9584. <param name="iterationCount">the iteration count.</param>
  9585. <returns>this</returns>
  9586. <exception cref="T:System.ArgumentException">if iteration count is less than 100</exception>
  9587. </member>
  9588. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PKMacBuilder.SetParameters(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PbmParameter)">
  9589. <summary>
  9590. Set PbmParameters
  9591. </summary>
  9592. <param name="parameters">The parameters.</param>
  9593. <returns>this</returns>
  9594. </member>
  9595. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PKMacBuilder.SetSecureRandom(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  9596. <summary>
  9597. The Secure random
  9598. </summary>
  9599. <param name="random">The random.</param>
  9600. <returns>this</returns>
  9601. </member>
  9602. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.PKMacBuilder.Build(System.Char[])">
  9603. <summary>
  9604. Build an IMacFactory.
  9605. </summary>
  9606. <param name="password">The password.</param>
  9607. <returns>IMacFactory</returns>
  9608. </member>
  9609. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.RegTokenControl.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerUtf8String)">
  9610. <summary>
  9611. Basic constructor - build from a UTF-8 string representing the token.
  9612. </summary>
  9613. <param name="token">UTF-8 string representing the token.</param>
  9614. </member>
  9615. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.RegTokenControl.#ctor(System.String)">
  9616. <summary>
  9617. Basic constructor - build from a string representing the token.
  9618. </summary>
  9619. <param name="token">string representing the token.</param>
  9620. </member>
  9621. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.RegTokenControl.Type">
  9622. <summary>
  9623. Return the type of this control.
  9624. </summary>
  9625. <returns>CRMFObjectIdentifiers.id_regCtrl_regToken</returns>
  9626. </member>
  9627. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf.RegTokenControl.Value">
  9628. <summary>
  9629. Return the token associated with this control (a UTF8String).
  9630. </summary>
  9631. <returns>a UTF8String.</returns>
  9632. </member>
  9633. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.DHAgreement">
  9634. a Diffie-Hellman key exchange engine.
  9635. <p>
  9636. note: This uses MTI/A0 key agreement in order to make the key agreement
  9637. secure against passive attacks. If you're doing Diffie-Hellman and both
  9638. parties have long term public keys you should look at using this. For
  9639. further information have a look at RFC 2631.</p>
  9640. <p>
  9641. It's possible to extend this to more than two parties as well, for the moment
  9642. that is left as an exercise for the reader.</p>
  9643. </member>
  9644. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.DHAgreement.CalculateMessage">
  9645. calculate our initial message.
  9646. </member>
  9647. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.DHAgreement.CalculateAgreement(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DHPublicKeyParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  9648. given a message from a given party and the corresponding public key
  9649. calculate the next message in the agreement sequence. In this case
  9650. this will represent the shared secret.
  9651. </member>
  9652. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.DHBasicAgreement">
  9653. a Diffie-Hellman key agreement class.
  9654. <p>
  9655. note: This is only the basic algorithm, it doesn't take advantage of
  9656. long term public keys if they are available. See the DHAgreement class
  9657. for a "better" implementation.</p>
  9658. </member>
  9659. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.DHBasicAgreement.CalculateAgreement(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  9660. given a short term public key from a given party calculate the next
  9661. message in the agreement sequence.
  9662. </member>
  9663. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.DHStandardGroups">
  9664. <summary>Standard Diffie-Hellman groups from various IETF specifications.</summary>
  9665. </member>
  9666. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.ECDHBasicAgreement">
  9667. P1363 7.2.1 ECSVDP-DH
  9668. ECSVDP-DH is Elliptic Curve Secret Value Derivation Primitive,
  9669. Diffie-Hellman version. It is based on the work of [DH76], [Mil86],
  9670. and [Kob87]. This primitive derives a shared secret value from one
  9671. party's private key and another party's public key, where both have
  9672. the same set of EC domain parameters. If two parties correctly
  9673. execute this primitive, they will produce the same output. This
  9674. primitive can be invoked by a scheme to derive a shared secret key;
  9675. specifically, it may be used with the schemes ECKAS-DH1 and
  9676. DL/ECKAS-DH2. It assumes that the input keys are valid (see also
  9677. Section 7.2.2).
  9678. </member>
  9679. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.ECDHCBasicAgreement">
  9680. P1363 7.2.2 ECSVDP-DHC
  9681. ECSVDP-DHC is Elliptic Curve Secret Value Derivation Primitive,
  9682. Diffie-Hellman version with cofactor multiplication. It is based on
  9683. the work of [DH76], [Mil86], [Kob87], [LMQ98] and [Kal98a]. This
  9684. primitive derives a shared secret value from one party's private key
  9685. and another party's public key, where both have the same set of EC
  9686. domain parameters. If two parties correctly execute this primitive,
  9687. they will produce the same output. This primitive can be invoked by a
  9688. scheme to derive a shared secret key; specifically, it may be used
  9689. with the schemes ECKAS-DH1 and DL/ECKAS-DH2. It does not assume the
  9690. validity of the input public key (see also Section 7.2.1).
  9691. <p>
  9692. Note: As stated P1363 compatibility mode with ECDH can be preset, and
  9693. in this case the implementation doesn't have a ECDH compatibility mode
  9694. (if you want that just use ECDHBasicAgreement and note they both implement
  9695. BasicAgreement!).</p>
  9696. </member>
  9697. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant">
  9698. <summary>
  9699. A participant in a Password Authenticated Key Exchange by Juggling (J-PAKE) exchange.
  9700. The J-PAKE exchange is defined by Feng Hao and Peter Ryan in the paper
  9701. <a href="http://grouper.ieee.org/groups/1363/Research/contributions/hao-ryan-2008.pdf">
  9702. "Password Authenticated Key Exchange by Juggling, 2008."</a>
  9703. The J-PAKE protocol is symmetric.
  9704. There is no notion of a <i>client</i> or <i>server</i>, but rather just two <i>participants</i>.
  9705. An instance of JPakeParticipant represents one participant, and
  9706. is the primary interface for executing the exchange.
  9707. To execute an exchange, construct a JPakeParticipant on each end,
  9708. and call the following 7 methods
  9709. (once and only once, in the given order, for each participant, sending messages between them as described):
  9710. CreateRound1PayloadToSend() - and send the payload to the other participant
  9711. ValidateRound1PayloadReceived(JPakeRound1Payload) - use the payload received from the other participant
  9712. CreateRound2PayloadToSend() - and send the payload to the other participant
  9713. ValidateRound2PayloadReceived(JPakeRound2Payload) - use the payload received from the other participant
  9714. CalculateKeyingMaterial()
  9715. CreateRound3PayloadToSend(BigInteger) - and send the payload to the other participant
  9716. ValidateRound3PayloadReceived(JPakeRound3Payload, BigInteger) - use the payload received from the other participant
  9717. Each side should derive a session key from the keying material returned by CalculateKeyingMaterial().
  9718. The caller is responsible for deriving the session key using a secure key derivation function (KDF).
  9719. Round 3 is an optional key confirmation process.
  9720. If you do not execute round 3, then there is no assurance that both participants are using the same key.
  9721. (i.e. if the participants used different passwords, then their session keys will differ.)
  9722. If the round 3 validation succeeds, then the keys are guaranteed to be the same on both sides.
  9723. The symmetric design can easily support the asymmetric cases when one party initiates the communication.
  9724. e.g. Sometimes the round1 payload and round2 payload may be sent in one pass.
  9725. Also, in some cases, the key confirmation payload can be sent together with the round2 payload.
  9726. These are the trivial techniques to optimize the communication.
  9727. The key confirmation process is implemented as specified in
  9728. <a href="http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf">NIST SP 800-56A Revision 1</a>,
  9729. Section 8.2 Unilateral Key Confirmation for Key Agreement Schemes.
  9730. This class is stateful and NOT threadsafe.
  9731. Each instance should only be used for ONE complete J-PAKE exchange
  9732. (i.e. a new JPakeParticipant should be constructed for each new J-PAKE exchange).
  9733. </summary>
  9734. </member>
  9735. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.#ctor(System.String,System.Char[])">
  9736. <summary>
  9737. Convenience constructor for a new JPakeParticipant that uses
  9738. the JPakePrimeOrderGroups#NIST_3072 prime order group,
  9739. a SHA-256 digest, and a default SecureRandom implementation.
  9740. After construction, the State state will be STATE_INITIALIZED.
  9741. Throws NullReferenceException if any argument is null. Throws
  9742. ArgumentException if password is empty.
  9743. </summary>
  9744. <param name="participantId">Unique identifier of this participant.
  9745. The two participants in the exchange must NOT share the same id.</param>
  9746. <param name="password">Shared secret.
  9747. A defensive copy of this array is made (and cleared once CalculateKeyingMaterial() is called).
  9748. Caller should clear the input password as soon as possible.</param>
  9749. </member>
  9750. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.#ctor(System.String,System.Char[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroup)">
  9751. <summary>
  9752. Convenience constructor for a new JPakeParticipant that uses
  9753. a SHA-256 digest, and a default SecureRandom implementation.
  9754. After construction, the State state will be STATE_INITIALIZED.
  9755. Throws NullReferenceException if any argument is null. Throws
  9756. ArgumentException if password is empty.
  9757. </summary>
  9758. <param name="participantId">Unique identifier of this participant.
  9759. The two participants in the exchange must NOT share the same id.</param>
  9760. <param name="password">Shared secret.
  9761. A defensive copy of this array is made (and cleared once CalculateKeyingMaterial() is called).
  9762. Caller should clear the input password as soon as possible.</param>
  9763. <param name="group">Prime order group. See JPakePrimeOrderGroups for standard groups.</param>
  9764. </member>
  9765. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.#ctor(System.String,System.Char[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroup,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  9766. <summary>
  9767. Constructor for a new JPakeParticipant.
  9768. After construction, the State state will be STATE_INITIALIZED.
  9769. Throws NullReferenceException if any argument is null. Throws
  9770. ArgumentException if password is empty.
  9771. </summary>
  9772. <param name="participantId">Unique identifier of this participant.
  9773. The two participants in the exchange must NOT share the same id.</param>
  9774. <param name="password">Shared secret.
  9775. A defensive copy of this array is made (and cleared once CalculateKeyingMaterial() is called).
  9776. Caller should clear the input password as soon as possible.</param>
  9777. <param name="group">Prime order group. See JPakePrimeOrderGroups for standard groups.</param>
  9778. <param name="digest">Digest to use during zero knowledge proofs and key confirmation
  9779. (SHA-256 or stronger preferred).</param>
  9780. <param name="random">Source of secure random data for x1 and x2, and for the zero knowledge proofs.</param>
  9781. </member>
  9782. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.State">
  9783. <summary>
  9784. Gets the current state of this participant.
  9785. See the <tt>STATE_*</tt> constants for possible values.
  9786. </summary>
  9787. </member>
  9788. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.CreateRound1PayloadToSend">
  9789. <summary>
  9790. Creates and returns the payload to send to the other participant during round 1.
  9791. After execution, the State state} will be STATE_ROUND_1_CREATED}.
  9792. </summary>
  9793. </member>
  9794. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.ValidateRound1PayloadReceived(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload)">
  9795. <summary>
  9796. Validates the payload received from the other participant during round 1.
  9797. Must be called prior to CreateRound2PayloadToSend().
  9798. After execution, the State state will be STATE_ROUND_1_VALIDATED.
  9799. Throws CryptoException if validation fails. Throws InvalidOperationException
  9800. if called multiple times.
  9801. </summary>
  9802. </member>
  9803. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.CreateRound2PayloadToSend">
  9804. <summary>
  9805. Creates and returns the payload to send to the other participant during round 2.
  9806. ValidateRound1PayloadReceived(JPakeRound1Payload) must be called prior to this method.
  9807. After execution, the State state will be STATE_ROUND_2_CREATED.
  9808. Throws InvalidOperationException if called prior to ValidateRound1PayloadReceived(JPakeRound1Payload), or multiple times
  9809. </summary>
  9810. </member>
  9811. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.ValidateRound2PayloadReceived(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound2Payload)">
  9812. <summary>
  9813. Validates the payload received from the other participant during round 2.
  9814. Note that this DOES NOT detect a non-common password.
  9815. The only indication of a non-common password is through derivation
  9816. of different keys (which can be detected explicitly by executing round 3 and round 4)
  9817. Must be called prior to CalculateKeyingMaterial().
  9818. After execution, the State state will be STATE_ROUND_2_VALIDATED.
  9819. Throws CryptoException if validation fails. Throws
  9820. InvalidOperationException if called prior to ValidateRound1PayloadReceived(JPakeRound1Payload), or multiple times
  9821. </summary>
  9822. </member>
  9823. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.CalculateKeyingMaterial">
  9824. <summary>
  9825. Calculates and returns the key material.
  9826. A session key must be derived from this key material using a secure key derivation function (KDF).
  9827. The KDF used to derive the key is handled externally (i.e. not by JPakeParticipant).
  9828. The keying material will be identical for each participant if and only if
  9829. each participant's password is the same. i.e. If the participants do not
  9830. share the same password, then each participant will derive a different key.
  9831. Therefore, if you immediately start using a key derived from
  9832. the keying material, then you must handle detection of incorrect keys.
  9833. If you want to handle this detection explicitly, you can optionally perform
  9834. rounds 3 and 4. See JPakeParticipant for details on how to execute
  9835. rounds 3 and 4.
  9836. The keying material will be in the range <tt>[0, p-1]</tt>.
  9837. ValidateRound2PayloadReceived(JPakeRound2Payload) must be called prior to this method.
  9838. As a side effect, the internal password array is cleared, since it is no longer needed.
  9839. After execution, the State state will be STATE_KEY_CALCULATED.
  9840. Throws InvalidOperationException if called prior to ValidateRound2PayloadReceived(JPakeRound2Payload),
  9841. or if called multiple times.
  9842. </summary>
  9843. </member>
  9844. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.CreateRound3PayloadToSend(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  9845. <summary>
  9846. Creates and returns the payload to send to the other participant during round 3.
  9847. See JPakeParticipant for more details on round 3.
  9848. After execution, the State state} will be STATE_ROUND_3_CREATED.
  9849. Throws InvalidOperationException if called prior to CalculateKeyingMaterial, or multiple
  9850. times.
  9851. </summary>
  9852. <param name="keyingMaterial">The keying material as returned from CalculateKeyingMaterial().</param>
  9853. </member>
  9854. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.ValidateRound3PayloadReceived(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound3Payload,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  9855. <summary>
  9856. Validates the payload received from the other participant during round 3.
  9857. See JPakeParticipant for more details on round 3.
  9858. After execution, the State state will be STATE_ROUND_3_VALIDATED.
  9859. Throws CryptoException if validation fails. Throws InvalidOperationException if called prior to
  9860. CalculateKeyingMaterial or multiple times
  9861. </summary>
  9862. <param name="round3PayloadReceived">The round 3 payload received from the other participant.</param>
  9863. <param name="keyingMaterial">The keying material as returned from CalculateKeyingMaterial().</param>
  9864. </member>
  9865. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroup">
  9866. <summary>
  9867. A pre-computed prime order group for use during a J-PAKE exchange.
  9868. Typically a Schnorr group is used. In general, J-PAKE can use any prime order group
  9869. that is suitable for public key cryptography, including elliptic curve cryptography.
  9870. See JPakePrimeOrderGroups for convenient standard groups.
  9871. NIST <a href="http://csrc.nist.gov/groups/ST/toolkit/documents/Examples/DSA2_All.pdf">publishes</a>
  9872. many groups that can be used for the desired level of security.
  9873. </summary>
  9874. </member>
  9875. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroup.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  9876. <summary>
  9877. Constructs a new JPakePrimeOrderGroup.
  9878. In general, you should use one of the pre-approved groups from
  9879. JPakePrimeOrderGroups, rather than manually constructing one.
  9880. The following basic checks are performed:
  9881. p-1 must be evenly divisible by q
  9882. g must be in [2, p-1]
  9883. g^q mod p must equal 1
  9884. p must be prime (within reasonably certainty)
  9885. q must be prime (within reasonably certainty)
  9886. The prime checks are performed using BigInteger#isProbablePrime(int),
  9887. and are therefore subject to the same probability guarantees.
  9888. These checks prevent trivial mistakes.
  9889. However, due to the small uncertainties if p and q are not prime,
  9890. advanced attacks are not prevented.
  9891. Use it at your own risk.
  9892. Throws NullReferenceException if any argument is null. Throws
  9893. InvalidOperationException is any of the above validations fail.
  9894. </summary>
  9895. </member>
  9896. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroup.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.Boolean)">
  9897. <summary>
  9898. Constructor used by the pre-approved groups in JPakePrimeOrderGroups.
  9899. These pre-approved groups can avoid the expensive checks.
  9900. User-specified groups should not use this constructor.
  9901. </summary>
  9902. </member>
  9903. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroups">
  9904. <summary>
  9905. Standard pre-computed prime order groups for use by J-PAKE.
  9906. (J-PAKE can use pre-computed prime order groups, same as DSA and Diffie-Hellman.)
  9907. <p/>
  9908. This class contains some convenient constants for use as input for
  9909. constructing {@link JPAKEParticipant}s.
  9910. <p/>
  9911. The prime order groups below are taken from Sun's JDK JavaDoc (docs/guide/security/CryptoSpec.html#AppB),
  9912. and from the prime order groups
  9913. <a href="http://csrc.nist.gov/groups/ST/toolkit/documents/Examples/DSA2_All.pdf">published by NIST</a>.
  9914. </summary>
  9915. </member>
  9916. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroups.SUN_JCE_1024">
  9917. <summary>
  9918. From Sun's JDK JavaDoc (docs/guide/security/CryptoSpec.html#AppB)
  9919. 1024-bit p, 160-bit q and 1024-bit g for 80-bit security.
  9920. </summary>
  9921. </member>
  9922. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroups.NIST_2048">
  9923. <summary>
  9924. From NIST.
  9925. 2048-bit p, 224-bit q and 2048-bit g for 112-bit security.
  9926. </summary>
  9927. </member>
  9928. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroups.NIST_3072">
  9929. <summary>
  9930. From NIST.
  9931. 3072-bit p, 256-bit q and 3072-bit g for 128-bit security.
  9932. </summary>
  9933. </member>
  9934. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload">
  9935. <summary>
  9936. The payload sent/received during the first round of a J-PAKE exchange.
  9937. Each JPAKEParticipant creates and sends an instance of this payload to
  9938. the other. The payload to send should be created via
  9939. JPAKEParticipant.CreateRound1PayloadToSend().
  9940. Each participant must also validate the payload received from the other.
  9941. The received payload should be validated via
  9942. JPAKEParticipant.ValidateRound1PayloadReceived(JPakeRound1Payload).
  9943. </summary>
  9944. </member>
  9945. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload.participantId">
  9946. <summary>
  9947. The id of the JPAKEParticipant who created/sent this payload.
  9948. </summary>
  9949. </member>
  9950. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload.gx1">
  9951. <summary>
  9952. The value of g^x1
  9953. </summary>
  9954. </member>
  9955. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload.gx2">
  9956. <summary>
  9957. The value of g^x2
  9958. </summary>
  9959. </member>
  9960. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload.knowledgeProofForX1">
  9961. <summary>
  9962. The zero knowledge proof for x1.
  9963. This is a two element array, containing {g^v, r} for x1.
  9964. </summary>
  9965. </member>
  9966. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload.knowledgeProofForX2">
  9967. <summary>
  9968. The zero knowledge proof for x2.
  9969. This is a two element array, containing {g^v, r} for x2.
  9970. </summary>
  9971. </member>
  9972. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound2Payload">
  9973. <summary>
  9974. The payload sent/received during the second round of a J-PAKE exchange.
  9975. Each JPAKEParticipant creates and sends an instance
  9976. of this payload to the other JPAKEParticipant.
  9977. The payload to send should be created via
  9978. JPAKEParticipant#createRound2PayloadToSend()
  9979. Each JPAKEParticipant must also validate the payload
  9980. received from the other JPAKEParticipant.
  9981. The received payload should be validated via
  9982. JPAKEParticipant#validateRound2PayloadReceived(JPakeRound2Payload)
  9983. </summary>
  9984. </member>
  9985. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound2Payload.participantId">
  9986. <summary>
  9987. The id of the JPAKEParticipant who created/sent this payload.
  9988. </summary>
  9989. </member>
  9990. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound2Payload.a">
  9991. <summary>
  9992. The value of A, as computed during round 2.
  9993. </summary>
  9994. </member>
  9995. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound2Payload.knowledgeProofForX2s">
  9996. <summary>
  9997. The zero knowledge proof for x2 * s.
  9998. This is a two element array, containing {g^v, r} for x2 * s.
  9999. </summary>
  10000. </member>
  10001. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound3Payload">
  10002. <summary>
  10003. The payload sent/received during the optional third round of a J-PAKE exchange,
  10004. which is for explicit key confirmation.
  10005. Each JPAKEParticipant creates and sends an instance
  10006. of this payload to the other JPAKEParticipant.
  10007. The payload to send should be created via
  10008. JPAKEParticipant#createRound3PayloadToSend(BigInteger)
  10009. Eeach JPAKEParticipant must also validate the payload
  10010. received from the other JPAKEParticipant.
  10011. The received payload should be validated via
  10012. JPAKEParticipant#validateRound3PayloadReceived(JPakeRound3Payload, BigInteger)
  10013. </summary>
  10014. </member>
  10015. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound3Payload.participantId">
  10016. <summary>
  10017. The id of the {@link JPAKEParticipant} who created/sent this payload.
  10018. </summary>
  10019. </member>
  10020. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound3Payload.macTag">
  10021. <summary>
  10022. The value of MacTag, as computed by round 3.
  10023. See JPAKEUtil#calculateMacTag(string, string, BigInteger, BigInteger, BigInteger, BigInteger, BigInteger, org.bouncycastle.crypto.Digest)
  10024. </summary>
  10025. </member>
  10026. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities">
  10027. <summary>
  10028. Primitives needed for a J-PAKE exchange.
  10029. The recommended way to perform a J-PAKE exchange is by using
  10030. two JPAKEParticipants. Internally, those participants
  10031. call these primitive operations in JPakeUtilities.
  10032. The primitives, however, can be used without a JPAKEParticipant if needed.
  10033. </summary>
  10034. </member>
  10035. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.GenerateX1(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  10036. <summary>
  10037. Return a value that can be used as x1 or x3 during round 1.
  10038. The returned value is a random value in the range [0, q-1].
  10039. </summary>
  10040. </member>
  10041. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.GenerateX2(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  10042. <summary>
  10043. Return a value that can be used as x2 or x4 during round 1.
  10044. The returned value is a random value in the range [1, q-1].
  10045. </summary>
  10046. </member>
  10047. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateS(System.Char[])">
  10048. <summary>
  10049. Converts the given password to a BigInteger
  10050. for use in arithmetic calculations.
  10051. </summary>
  10052. </member>
  10053. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateGx(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10054. <summary>
  10055. Calculate g^x mod p as done in round 1.
  10056. </summary>
  10057. </member>
  10058. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateGA(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10059. <summary>
  10060. Calculate ga as done in round 2.
  10061. </summary>
  10062. </member>
  10063. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateX2s(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10064. <summary>
  10065. Calculate x2 * s as done in round 2.
  10066. </summary>
  10067. </member>
  10068. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateA(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10069. <summary>
  10070. Calculate A as done in round 2.
  10071. </summary>
  10072. </member>
  10073. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateZeroKnowledgeProof(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  10074. <summary>
  10075. Calculate a zero knowledge proof of x using Schnorr's signature.
  10076. The returned array has two elements {g^v, r = v-x*h} for x.
  10077. </summary>
  10078. </member>
  10079. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateGx4(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10080. <summary>
  10081. Validates that g^x4 is not 1.
  10082. throws CryptoException if g^x4 is 1
  10083. </summary>
  10084. </member>
  10085. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateGa(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10086. <summary>
  10087. Validates that ga is not 1.
  10088. As described by Feng Hao...
  10089. Alice could simply check ga != 1 to ensure it is a generator.
  10090. In fact, as we will explain in Section 3, (x1 + x3 + x4 ) is random over Zq even in the face of active attacks.
  10091. Hence, the probability for ga = 1 is extremely small - on the order of 2^160 for 160-bit q.
  10092. throws CryptoException if ga is 1
  10093. </summary>
  10094. </member>
  10095. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateZeroKnowledgeProof(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger[],System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  10096. <summary>
  10097. Validates the zero knowledge proof (generated by
  10098. calculateZeroKnowledgeProof(BigInteger, BigInteger, BigInteger, BigInteger, BigInteger, string, Digest, SecureRandom)
  10099. is correct.
  10100. throws CryptoException if the zero knowledge proof is not correct
  10101. </summary>
  10102. </member>
  10103. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateKeyingMaterial(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10104. <summary>
  10105. Calculates the keying material, which can be done after round 2 has completed.
  10106. A session key must be derived from this key material using a secure key derivation function (KDF).
  10107. The KDF used to derive the key is handled externally (i.e. not by JPAKEParticipant).
  10108. KeyingMaterial = (B/g^{x2*x4*s})^x2
  10109. </summary>
  10110. </member>
  10111. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateParticipantIdsDiffer(System.String,System.String)">
  10112. <summary>
  10113. Validates that the given participant ids are not equal.
  10114. (For the J-PAKE exchange, each participant must use a unique id.)
  10115. Throws CryptoException if the participantId strings are equal.
  10116. </summary>
  10117. </member>
  10118. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateParticipantIdsEqual(System.String,System.String)">
  10119. <summary>
  10120. Validates that the given participant ids are equal.
  10121. This is used to ensure that the payloads received from
  10122. each round all come from the same participant.
  10123. </summary>
  10124. </member>
  10125. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateNotNull(System.Object,System.String)">
  10126. <summary>
  10127. Validates that the given object is not null.
  10128. throws NullReferenceException if the object is null.
  10129. </summary>
  10130. <param name="obj">object in question</param>
  10131. <param name="description">name of the object (to be used in exception message)</param>
  10132. </member>
  10133. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateMacTag(System.String,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  10134. <summary>
  10135. Calculates the MacTag (to be used for key confirmation), as defined by
  10136. <a href="http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf">NIST SP 800-56A Revision 1</a>,
  10137. Section 8.2 Unilateral Key Confirmation for Key Agreement Schemes.
  10138. MacTag = HMAC(MacKey, MacLen, MacData)
  10139. MacKey = H(K || "JPAKE_KC")
  10140. MacData = "KC_1_U" || participantId || partnerParticipantId || gx1 || gx2 || gx3 || gx4
  10141. Note that both participants use "KC_1_U" because the sender of the round 3 message
  10142. is always the initiator for key confirmation.
  10143. HMAC = {@link HMac} used with the given {@link Digest}
  10144. H = The given {@link Digest}
  10145. MacLen = length of MacTag
  10146. </summary>
  10147. </member>
  10148. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateMacKey(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  10149. <summary>
  10150. Calculates the MacKey (i.e. the key to use when calculating the MagTag for key confirmation).
  10151. MacKey = H(K || "JPAKE_KC")
  10152. </summary>
  10153. </member>
  10154. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateMacTag(System.String,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10155. <summary>
  10156. Validates the MacTag received from the partner participant.
  10157. throws CryptoException if the participantId strings are equal.
  10158. </summary>
  10159. </member>
  10160. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf.ConcatenationKdfGenerator">
  10161. <summary>Generator for Concatenation Key Derivation Function defined in NIST SP 800-56A, Sect 5.8.1</summary>
  10162. </member>
  10163. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf.ConcatenationKdfGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  10164. <param name="digest">the digest to be used as the source of generated bytes</param>
  10165. </member>
  10166. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf.ConcatenationKdfGenerator.Digest">
  10167. <summary>the underlying digest.</summary>
  10168. </member>
  10169. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf.ConcatenationKdfGenerator.GenerateBytes(System.Byte[],System.Int32,System.Int32)">
  10170. <summary>Fill <c>len</c> bytes of the output buffer with bytes generated from the derivation function.
  10171. </summary>
  10172. </member>
  10173. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf.DHKekGenerator">
  10174. RFC 2631 Diffie-hellman KEK derivation function.
  10175. </member>
  10176. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf.ECDHKekGenerator">
  10177. X9.63 based key derivation function for ECDH CMS.
  10178. </member>
  10179. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.SM2KeyExchange">
  10180. <summary>
  10181. SM2 Key Exchange protocol - based on https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
  10182. </summary>
  10183. </member>
  10184. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client">
  10185. Implements the client side SRP-6a protocol. Note that this class is stateful, and therefore NOT threadsafe.
  10186. This implementation of SRP is based on the optimized message sequence put forth by Thomas Wu in the paper
  10187. "SRP-6: Improvements and Refinements to the Secure Remote Password Protocol, 2002"
  10188. </member>
  10189. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  10190. Initialises the client to begin new authentication attempt
  10191. @param N The safe prime associated with the client's verifier
  10192. @param g The group parameter associated with the client's verifier
  10193. @param digest The digest algorithm associated with the client's verifier
  10194. @param random For key generation
  10195. </member>
  10196. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.GenerateClientCredentials(System.Byte[],System.Byte[],System.Byte[])">
  10197. Generates client's credentials given the client's salt, identity and password
  10198. @param salt The salt used in the client's verifier.
  10199. @param identity The user's identity (eg. username)
  10200. @param password The user's password
  10201. @return Client's public value to send to server
  10202. </member>
  10203. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.CalculateSecret(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10204. Generates client's verification message given the server's credentials
  10205. @param serverB The server's credentials
  10206. @return Client's verification message for the server
  10207. @throws CryptoException If server's credentials are invalid
  10208. </member>
  10209. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.CalculateClientEvidenceMessage">
  10210. Computes the client evidence message M1 using the previously received values.
  10211. To be called after calculating the secret S.
  10212. @return M1: the client side generated evidence message
  10213. @throws CryptoException
  10214. </member>
  10215. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.VerifyServerEvidenceMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10216. Authenticates the server evidence message M2 received and saves it only if correct.
  10217. @param M2: the server side generated evidence message
  10218. @return A boolean indicating if the server message M2 was the expected one.
  10219. @throws CryptoException
  10220. </member>
  10221. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.CalculateSessionKey">
  10222. Computes the final session key as a result of the SRP successful mutual authentication
  10223. To be called after verifying the server evidence message M2.
  10224. @return Key: the mutually authenticated symmetric session key
  10225. @throws CryptoException
  10226. </member>
  10227. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server">
  10228. Implements the server side SRP-6a protocol. Note that this class is stateful, and therefore NOT threadsafe.
  10229. This implementation of SRP is based on the optimized message sequence put forth by Thomas Wu in the paper
  10230. "SRP-6: Improvements and Refinements to the Secure Remote Password Protocol, 2002"
  10231. </member>
  10232. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  10233. Initialises the server to accept a new client authentication attempt
  10234. @param N The safe prime associated with the client's verifier
  10235. @param g The group parameter associated with the client's verifier
  10236. @param v The client's verifier
  10237. @param digest The digest algorithm associated with the client's verifier
  10238. @param random For key generation
  10239. </member>
  10240. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.GenerateServerCredentials">
  10241. Generates the server's credentials that are to be sent to the client.
  10242. @return The server's public value to the client
  10243. </member>
  10244. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.CalculateSecret(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10245. Processes the client's credentials. If valid the shared secret is generated and returned.
  10246. @param clientA The client's credentials
  10247. @return A shared secret BigInteger
  10248. @throws CryptoException If client's credentials are invalid
  10249. </member>
  10250. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.VerifyClientEvidenceMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10251. Authenticates the received client evidence message M1 and saves it only if correct.
  10252. To be called after calculating the secret S.
  10253. @param M1: the client side generated evidence message
  10254. @return A boolean indicating if the client message M1 was the expected one.
  10255. @throws CryptoException
  10256. </member>
  10257. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.CalculateServerEvidenceMessage">
  10258. Computes the server evidence message M2 using the previously verified values.
  10259. To be called after successfully verifying the client evidence message M1.
  10260. @return M2: the server side generated evidence message
  10261. @throws CryptoException
  10262. </member>
  10263. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.CalculateSessionKey">
  10264. Computes the final session key as a result of the SRP successful mutual authentication
  10265. To be called after calculating the server evidence message M2.
  10266. @return Key: the mutual authenticated symmetric session key
  10267. @throws CryptoException
  10268. </member>
  10269. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Utilities.CalculateM1(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10270. Computes the client evidence message (M1) according to the standard routine:
  10271. M1 = H( A | B | S )
  10272. @param digest The Digest used as the hashing function H
  10273. @param N Modulus used to get the pad length
  10274. @param A The public client value
  10275. @param B The public server value
  10276. @param S The secret calculated by both sides
  10277. @return M1 The calculated client evidence message
  10278. </member>
  10279. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Utilities.CalculateM2(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10280. Computes the server evidence message (M2) according to the standard routine:
  10281. M2 = H( A | M1 | S )
  10282. @param digest The Digest used as the hashing function H
  10283. @param N Modulus used to get the pad length
  10284. @param A The public client value
  10285. @param M1 The client evidence message
  10286. @param S The secret calculated by both sides
  10287. @return M2 The calculated server evidence message
  10288. </member>
  10289. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Utilities.CalculateKey(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  10290. Computes the final Key according to the standard routine: Key = H(S)
  10291. @param digest The Digest used as the hashing function H
  10292. @param N Modulus used to get the pad length
  10293. @param S The secret calculated by both sides
  10294. @return
  10295. </member>
  10296. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6VerifierGenerator">
  10297. Generates new SRP verifier for user
  10298. </member>
  10299. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6VerifierGenerator.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  10300. Initialises generator to create new verifiers
  10301. @param N The safe prime to use (see DHParametersGenerator)
  10302. @param g The group parameter to use (see DHParametersGenerator)
  10303. @param digest The digest to use. The same digest type will need to be used later for the actual authentication
  10304. attempt. Also note that the final session key size is dependent on the chosen digest.
  10305. </member>
  10306. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp.Srp6VerifierGenerator.GenerateVerifier(System.Byte[],System.Byte[],System.Byte[])">
  10307. Creates a new SRP verifier
  10308. @param salt The salt to use, generally should be large and random
  10309. @param identity The user's identifying information (eg. username)
  10310. @param password The user's password
  10311. @return A new verifier for use in future SRP authentication
  10312. </member>
  10313. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricCipherKeyPair">
  10314. a holding class for public/private parameter pairs.
  10315. </member>
  10316. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricCipherKeyPair.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  10317. basic constructor.
  10318. @param publicParam a public key parameters object.
  10319. @param privateParam the corresponding private key parameters.
  10320. </member>
  10321. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricCipherKeyPair.Public">
  10322. return the public key parameters.
  10323. @return the public key parameters.
  10324. </member>
  10325. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricCipherKeyPair.Private">
  10326. return the private key parameters.
  10327. @return the private key parameters.
  10328. </member>
  10329. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadBlockCipher">
  10330. The AEAD block ciphers already handle buffering internally, so this class
  10331. just takes care of implementing IBufferedCipher methods.
  10332. </member>
  10333. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  10334. initialise the cipher.
  10335. @param forEncryption if true the cipher is initialised for
  10336. encryption, if false for decryption.
  10337. @param param the key and other data required by the cipher.
  10338. @exception ArgumentException if the parameters argument is
  10339. inappropriate.
  10340. </member>
  10341. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.GetBlockSize">
  10342. return the blocksize for the underlying cipher.
  10343. @return the blocksize for the underlying cipher.
  10344. </member>
  10345. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.GetUpdateOutputSize(System.Int32)">
  10346. return the size of the output buffer required for an update
  10347. an input of len bytes.
  10348. @param len the length of the input.
  10349. @return the space required to accommodate a call to update
  10350. with len bytes of input.
  10351. </member>
  10352. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.GetOutputSize(System.Int32)">
  10353. return the size of the output buffer required for an update plus a
  10354. doFinal with an input of len bytes.
  10355. @param len the length of the input.
  10356. @return the space required to accommodate a call to update and doFinal
  10357. with len bytes of input.
  10358. </member>
  10359. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  10360. process a single byte, producing an output block if necessary.
  10361. @param in the input byte.
  10362. @param out the space for any output that might be produced.
  10363. @param outOff the offset from which the output will be copied.
  10364. @return the number of output bytes copied to out.
  10365. @exception DataLengthException if there isn't enough space in out.
  10366. @exception InvalidOperationException if the cipher isn't initialised.
  10367. </member>
  10368. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  10369. process an array of bytes, producing output if necessary.
  10370. @param in the input byte array.
  10371. @param inOff the offset at which the input data starts.
  10372. @param len the number of bytes to be copied out of the input array.
  10373. @param out the space for any output that might be produced.
  10374. @param outOff the offset from which the output will be copied.
  10375. @return the number of output bytes copied to out.
  10376. @exception DataLengthException if there isn't enough space in out.
  10377. @exception InvalidOperationException if the cipher isn't initialised.
  10378. </member>
  10379. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.DoFinal(System.Byte[],System.Int32)">
  10380. Process the last block in the buffer.
  10381. @param out the array the block currently being held is copied into.
  10382. @param outOff the offset at which the copying starts.
  10383. @return the number of output bytes copied to out.
  10384. @exception DataLengthException if there is insufficient space in out for
  10385. the output, or the input is not block size aligned and should be.
  10386. @exception InvalidOperationException if the underlying cipher is not
  10387. initialised.
  10388. @exception InvalidCipherTextException if padding is expected and not found.
  10389. @exception DataLengthException if the input is not block size
  10390. aligned.
  10391. </member>
  10392. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.Reset">
  10393. Reset the buffer and cipher. After resetting the object is in the same
  10394. state as it was after the last init (if there was one).
  10395. </member>
  10396. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadCipher">
  10397. The AEAD ciphers already handle buffering internally, so this class
  10398. just takes care of implementing IBufferedCipher methods.
  10399. </member>
  10400. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  10401. initialise the cipher.
  10402. @param forEncryption if true the cipher is initialised for
  10403. encryption, if false for decryption.
  10404. @param param the key and other data required by the cipher.
  10405. @exception ArgumentException if the parameters argument is
  10406. inappropriate.
  10407. </member>
  10408. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadCipher.GetBlockSize">
  10409. return the blocksize for the underlying cipher.
  10410. @return the blocksize for the underlying cipher.
  10411. </member>
  10412. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadCipher.GetUpdateOutputSize(System.Int32)">
  10413. return the size of the output buffer required for an update
  10414. an input of len bytes.
  10415. @param len the length of the input.
  10416. @return the space required to accommodate a call to update
  10417. with len bytes of input.
  10418. </member>
  10419. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadCipher.GetOutputSize(System.Int32)">
  10420. return the size of the output buffer required for an update plus a
  10421. doFinal with an input of len bytes.
  10422. @param len the length of the input.
  10423. @return the space required to accommodate a call to update and doFinal
  10424. with len bytes of input.
  10425. </member>
  10426. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  10427. process a single byte, producing an output block if necessary.
  10428. @param in the input byte.
  10429. @param out the space for any output that might be produced.
  10430. @param outOff the offset from which the output will be copied.
  10431. @return the number of output bytes copied to out.
  10432. @exception DataLengthException if there isn't enough space in out.
  10433. @exception InvalidOperationException if the cipher isn't initialised.
  10434. </member>
  10435. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  10436. process an array of bytes, producing output if necessary.
  10437. @param in the input byte array.
  10438. @param inOff the offset at which the input data starts.
  10439. @param len the number of bytes to be copied out of the input array.
  10440. @param out the space for any output that might be produced.
  10441. @param outOff the offset from which the output will be copied.
  10442. @return the number of output bytes copied to out.
  10443. @exception DataLengthException if there isn't enough space in out.
  10444. @exception InvalidOperationException if the cipher isn't initialised.
  10445. </member>
  10446. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadCipher.DoFinal(System.Byte[],System.Int32)">
  10447. Process the last block in the buffer.
  10448. @param out the array the block currently being held is copied into.
  10449. @param outOff the offset at which the copying starts.
  10450. @return the number of output bytes copied to out.
  10451. @exception DataLengthException if there is insufficient space in out for
  10452. the output, or the input is not block size aligned and should be.
  10453. @exception InvalidOperationException if the underlying cipher is not
  10454. initialised.
  10455. @exception InvalidCipherTextException if padding is expected and not found.
  10456. @exception DataLengthException if the input is not block size
  10457. aligned.
  10458. </member>
  10459. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAeadCipher.Reset">
  10460. Reset the buffer and cipher. After resetting the object is in the same
  10461. state as it was after the last init (if there was one).
  10462. </member>
  10463. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher">
  10464. a buffer wrapper for an asymmetric block cipher, allowing input
  10465. to be accumulated in a piecemeal fashion until final processing.
  10466. </member>
  10467. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher)">
  10468. base constructor.
  10469. @param cipher the cipher this buffering object wraps.
  10470. </member>
  10471. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher.GetBufferPosition">
  10472. return the amount of data sitting in the buffer.
  10473. @return the amount of data sitting in the buffer.
  10474. </member>
  10475. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  10476. initialise the buffer and the underlying cipher.
  10477. @param forEncryption if true the cipher is initialised for
  10478. encryption, if false for decryption.
  10479. @param param the key and other data required by the cipher.
  10480. </member>
  10481. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher.DoFinal">
  10482. process the contents of the buffer using the underlying
  10483. cipher.
  10484. @return the result of the encryption/decryption process on the
  10485. buffer.
  10486. @exception InvalidCipherTextException if we are given a garbage block.
  10487. </member>
  10488. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher.Reset">
  10489. <summary>Reset the buffer</summary>
  10490. </member>
  10491. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher">
  10492. A wrapper class that allows block ciphers to be used to process data in
  10493. a piecemeal fashion. The BufferedBlockCipher outputs a block only when the
  10494. buffer is full and more data is being added, or on a doFinal.
  10495. <p>
  10496. Note: in the case where the underlying cipher is either a CFB cipher or an
  10497. OFB one the last block may not be a multiple of the block size.
  10498. </p>
  10499. </member>
  10500. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher.#ctor">
  10501. constructor for subclasses
  10502. </member>
  10503. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IBlockCipherMode)">
  10504. Create a buffered block cipher without padding.
  10505. @param cipher the underlying block cipher this buffering object wraps.
  10506. false otherwise.
  10507. </member>
  10508. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  10509. initialise the cipher.
  10510. @param forEncryption if true the cipher is initialised for
  10511. encryption, if false for decryption.
  10512. @param param the key and other data required by the cipher.
  10513. @exception ArgumentException if the parameters argument is
  10514. inappropriate.
  10515. </member>
  10516. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher.GetBlockSize">
  10517. return the blocksize for the underlying cipher.
  10518. @return the blocksize for the underlying cipher.
  10519. </member>
  10520. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher.GetUpdateOutputSize(System.Int32)">
  10521. return the size of the output buffer required for an update
  10522. an input of len bytes.
  10523. @param len the length of the input.
  10524. @return the space required to accommodate a call to update
  10525. with len bytes of input.
  10526. </member>
  10527. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher.GetOutputSize(System.Int32)">
  10528. return the size of the output buffer required for an update plus a
  10529. doFinal with an input of len bytes.
  10530. @param len the length of the input.
  10531. @return the space required to accommodate a call to update and doFinal
  10532. with len bytes of input.
  10533. </member>
  10534. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  10535. process a single byte, producing an output block if necessary.
  10536. @param in the input byte.
  10537. @param out the space for any output that might be produced.
  10538. @param outOff the offset from which the output will be copied.
  10539. @return the number of output bytes copied to out.
  10540. @exception DataLengthException if there isn't enough space in out.
  10541. @exception InvalidOperationException if the cipher isn't initialised.
  10542. </member>
  10543. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  10544. process an array of bytes, producing output if necessary.
  10545. @param in the input byte array.
  10546. @param inOff the offset at which the input data starts.
  10547. @param len the number of bytes to be copied out of the input array.
  10548. @param out the space for any output that might be produced.
  10549. @param outOff the offset from which the output will be copied.
  10550. @return the number of output bytes copied to out.
  10551. @exception DataLengthException if there isn't enough space in out.
  10552. @exception InvalidOperationException if the cipher isn't initialised.
  10553. </member>
  10554. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher.DoFinal(System.Byte[],System.Int32)">
  10555. Process the last block in the buffer.
  10556. @param out the array the block currently being held is copied into.
  10557. @param outOff the offset at which the copying starts.
  10558. @return the number of output bytes copied to out.
  10559. @exception DataLengthException if there is insufficient space in out for
  10560. the output, or the input is not block size aligned and should be.
  10561. @exception InvalidOperationException if the underlying cipher is not
  10562. initialised.
  10563. @exception InvalidCipherTextException if padding is expected and not found.
  10564. @exception DataLengthException if the input is not block size
  10565. aligned.
  10566. </member>
  10567. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher.Reset">
  10568. Reset the buffer and cipher. After resetting the object is in the same
  10569. state as it was after the last init (if there was one).
  10570. </member>
  10571. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.CipherKeyGenerator">
  10572. The base class for symmetric, or secret, cipher key generators.
  10573. </member>
  10574. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.CipherKeyGenerator.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.KeyGenerationParameters)">
  10575. initialise the key generator.
  10576. @param param the parameters to be used for key generation
  10577. </member>
  10578. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.CipherKeyGenerator.GenerateKey">
  10579. Generate a secret key.
  10580. @return a byte array containing the key value.
  10581. </member>
  10582. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.DataLengthException">
  10583. <summary>This exception is thrown if a buffer that is meant to have output copied into it turns out to be too
  10584. short, or if we've been given insufficient input.</summary>
  10585. <remarks>
  10586. In general this exception will get thrown rather than an <see cref="T:System.IndexOutOfRangeException"/>.
  10587. </remarks>
  10588. </member>
  10589. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest">
  10590. Implementation of the cryptographic hash function Blake2b.
  10591. <p/>
  10592. Blake2b offers a built-in keying mechanism to be used directly
  10593. for authentication ("Prefix-MAC") rather than a HMAC construction.
  10594. <p/>
  10595. Blake2b offers a built-in support for a salt for randomized hashing
  10596. and a personal string for defining a unique hash function for each application.
  10597. <p/>
  10598. BLAKE2b is optimized for 64-bit platforms and produces digests of any size
  10599. between 1 and 64 bytes.
  10600. </member>
  10601. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.#ctor(System.Int32)">
  10602. Basic sized constructor - size in bits.
  10603. @param digestSize size of the digest in bits
  10604. </member>
  10605. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.#ctor(System.Byte[])">
  10606. Blake2b for authentication ("Prefix-MAC mode").
  10607. After calling the doFinal() method, the key will
  10608. remain to be used for further computations of
  10609. this instance.
  10610. The key can be overwritten using the clearKey() method.
  10611. @param key A key up to 64 bytes or null
  10612. </member>
  10613. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.#ctor(System.Byte[],System.Int32,System.Byte[],System.Byte[])">
  10614. Blake2b with key, required digest length (in bytes), salt and personalization.
  10615. After calling the doFinal() method, the key, the salt and the personal string
  10616. will remain and might be used for further computations with this instance.
  10617. The key can be overwritten using the clearKey() method, the salt (pepper)
  10618. can be overwritten using the clearSalt() method.
  10619. @param key A key up to 64 bytes or null
  10620. @param digestLength from 1 up to 64 bytes
  10621. @param salt 16 bytes or null
  10622. @param personalization 16 bytes or null
  10623. </member>
  10624. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.Update(System.Byte)">
  10625. update the message digest with a single byte.
  10626. @param b the input byte to be entered.
  10627. </member>
  10628. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  10629. update the message digest with a block of bytes.
  10630. @param message the byte array containing the data.
  10631. @param offset the offset into the byte array where the data starts.
  10632. @param len the length of the data.
  10633. </member>
  10634. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.DoFinal(System.Byte[],System.Int32)">
  10635. close the digest, producing the final digest value. The doFinal
  10636. call leaves the digest reset.
  10637. Key, salt and personal string remain.
  10638. @param out the array the digest is to be copied into.
  10639. @param outOffset the offset into the out array the digest is to start at.
  10640. </member>
  10641. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.Reset">
  10642. Reset the digest back to it's initial state.
  10643. The key, the salt and the personal string will
  10644. remain for further computations.
  10645. </member>
  10646. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.AlgorithmName">
  10647. return the algorithm name
  10648. @return the algorithm name
  10649. </member>
  10650. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.GetDigestSize">
  10651. return the size, in bytes, of the digest produced by this message digest.
  10652. @return the size, in bytes, of the digest produced by this message digest.
  10653. </member>
  10654. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.GetByteLength">
  10655. Return the size in bytes of the internal buffer the digest applies it's compression
  10656. function to.
  10657. @return byte length of the digests internal buffer.
  10658. </member>
  10659. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.ClearKey">
  10660. Overwrite the key
  10661. if it is no longer used (zeroization)
  10662. </member>
  10663. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2bDigest.ClearSalt">
  10664. Overwrite the salt (pepper) if it
  10665. is secret and no longer used (zeroization)
  10666. </member>
  10667. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest">
  10668. Implementation of the cryptographic hash function BLAKE2s.
  10669. <p/>
  10670. BLAKE2s offers a built-in keying mechanism to be used directly
  10671. for authentication ("Prefix-MAC") rather than a HMAC construction.
  10672. <p/>
  10673. BLAKE2s offers a built-in support for a salt for randomized hashing
  10674. and a personal string for defining a unique hash function for each application.
  10675. <p/>
  10676. BLAKE2s is optimized for 32-bit platforms and produces digests of any size
  10677. between 1 and 32 bytes.
  10678. </member>
  10679. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.blake2s_IV">
  10680. BLAKE2s Initialization Vector
  10681. </member>
  10682. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.blake2s_sigma">
  10683. Message word permutations
  10684. </member>
  10685. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.buffer">
  10686. Whenever this buffer overflows, it will be processed in the Compress()
  10687. function. For performance issues, long messages will not use this buffer.
  10688. </member>
  10689. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.bufferPos">
  10690. Position of last inserted byte
  10691. </member>
  10692. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.internalState">
  10693. Internal state, in the BLAKE2 paper it is called v
  10694. </member>
  10695. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.chainValue">
  10696. State vector, in the BLAKE2 paper it is called h
  10697. </member>
  10698. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.t0">
  10699. holds least significant bits of counter
  10700. </member>
  10701. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.t1">
  10702. holds most significant bits of counter
  10703. </member>
  10704. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.f0">
  10705. finalization flag, for last block: ~0
  10706. </member>
  10707. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.#ctor">
  10708. BLAKE2s-256 for hashing.
  10709. </member>
  10710. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.#ctor(System.Int32)">
  10711. BLAKE2s for hashing.
  10712. @param digestBits the desired digest length in bits. Must be a multiple of 8 and less than 256.
  10713. </member>
  10714. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.#ctor(System.Byte[])">
  10715. BLAKE2s for authentication ("Prefix-MAC mode").
  10716. <p/>
  10717. After calling the doFinal() method, the key will remain to be used for
  10718. further computations of this instance. The key can be overwritten using
  10719. the clearKey() method.
  10720. @param key a key up to 32 bytes or null
  10721. </member>
  10722. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.#ctor(System.Byte[],System.Int32,System.Byte[],System.Byte[])">
  10723. BLAKE2s with key, required digest length, salt and personalization.
  10724. <p/>
  10725. After calling the doFinal() method, the key, the salt and the personal
  10726. string will remain and might be used for further computations with this
  10727. instance. The key can be overwritten using the clearKey() method, the
  10728. salt (pepper) can be overwritten using the clearSalt() method.
  10729. @param key a key up to 32 bytes or null
  10730. @param digestBytes from 1 up to 32 bytes
  10731. @param salt 8 bytes or null
  10732. @param personalization 8 bytes or null
  10733. </member>
  10734. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.Update(System.Byte)">
  10735. Update the message digest with a single byte.
  10736. @param b the input byte to be entered.
  10737. </member>
  10738. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  10739. Update the message digest with a block of bytes.
  10740. @param message the byte array containing the data.
  10741. @param offset the offset into the byte array where the data starts.
  10742. @param len the length of the data.
  10743. </member>
  10744. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.DoFinal(System.Byte[],System.Int32)">
  10745. Close the digest, producing the final digest value. The doFinal() call
  10746. leaves the digest reset. Key, salt and personal string remain.
  10747. @param out the array the digest is to be copied into.
  10748. @param outOffset the offset into the out array the digest is to start at.
  10749. </member>
  10750. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.Reset">
  10751. Reset the digest back to its initial state. The key, the salt and the
  10752. personal string will remain for further computations.
  10753. </member>
  10754. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.AlgorithmName">
  10755. Return the algorithm name.
  10756. @return the algorithm name
  10757. </member>
  10758. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.GetDigestSize">
  10759. Return the size in bytes of the digest produced by this message digest.
  10760. @return the size in bytes of the digest produced by this message digest.
  10761. </member>
  10762. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.GetByteLength">
  10763. Return the size in bytes of the internal buffer the digest applies its
  10764. compression function to.
  10765. @return byte length of the digest's internal buffer.
  10766. </member>
  10767. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.ClearKey">
  10768. Overwrite the key if it is no longer used (zeroization).
  10769. </member>
  10770. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2sDigest.ClearSalt">
  10771. Overwrite the salt (pepper) if it is secret and no longer used
  10772. (zeroization).
  10773. </member>
  10774. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest">
  10775. Implementation of the eXtendable Output Function (XOF) BLAKE2xs.
  10776. <p/>
  10777. BLAKE2xs offers a built-in keying mechanism to be used directly
  10778. for authentication ("Prefix-MAC") rather than a HMAC construction.
  10779. <p/>
  10780. BLAKE2xs offers a built-in support for a salt for randomized hashing
  10781. and a personal string for defining a unique hash function for each application.
  10782. <p/>
  10783. BLAKE2xs is optimized for 32-bit platforms and produces digests of any size
  10784. between 1 and 2^16-2 bytes. The length can also be unknown and then the maximum
  10785. length will be 2^32 blocks of 32 bytes.
  10786. </member>
  10787. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.UnknownDigestLength">
  10788. Magic number to indicate an unknown length of digest
  10789. </member>
  10790. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.digestLength">
  10791. Expected digest length for the xof. It can be unknown.
  10792. </member>
  10793. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.hash">
  10794. Root hash that will take the updates
  10795. </member>
  10796. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.h0">
  10797. Digest of the root hash
  10798. </member>
  10799. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.buf">
  10800. Digest of each round of the XOF
  10801. </member>
  10802. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.bufPos">
  10803. Current position for a round
  10804. </member>
  10805. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.digestPos">
  10806. Overall position of the digest. It is useful when the length is known
  10807. in advance to get last block length.
  10808. </member>
  10809. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.blockPos">
  10810. Keep track of the round number to detect the end of the digest after
  10811. 2^32 blocks of 32 bytes.
  10812. </member>
  10813. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.nodeOffset">
  10814. Current node offset incremented by 1 every round.
  10815. </member>
  10816. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.#ctor">
  10817. BLAKE2xs for hashing with unknown digest length
  10818. </member>
  10819. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.#ctor(System.Int32)">
  10820. BLAKE2xs for hashing
  10821. @param digestBytes The desired digest length in bytes. Must be above 1 and less than 2^16-1
  10822. </member>
  10823. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.#ctor(System.Int32,System.Byte[])">
  10824. BLAKE2xs with key
  10825. @param digestBytes The desired digest length in bytes. Must be above 1 and less than 2^16-1
  10826. @param key A key up to 32 bytes or null
  10827. </member>
  10828. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.#ctor(System.Int32,System.Byte[],System.Byte[],System.Byte[])">
  10829. BLAKE2xs with key, salt and personalization
  10830. @param digestBytes The desired digest length in bytes. Must be above 1 and less than 2^16-1
  10831. @param key A key up to 32 bytes or null
  10832. @param salt 8 bytes or null
  10833. @param personalization 8 bytes or null
  10834. </member>
  10835. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.AlgorithmName">
  10836. Return the algorithm name.
  10837. @return the algorithm name
  10838. </member>
  10839. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.GetDigestSize">
  10840. Return the size in bytes of the digest produced by this message digest.
  10841. @return the size in bytes of the digest produced by this message digest.
  10842. </member>
  10843. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.GetByteLength">
  10844. Return the size in bytes of the internal buffer the digest applies its
  10845. compression function to.
  10846. @return byte length of the digest's internal buffer.
  10847. </member>
  10848. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.GetUnknownMaxLength">
  10849. Return the maximum size in bytes the digest can produce when the length
  10850. is unknown
  10851. @return byte length of the largest digest with unknown length
  10852. </member>
  10853. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.Update(System.Byte)">
  10854. Update the message digest with a single byte.
  10855. @param in the input byte to be entered.
  10856. </member>
  10857. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  10858. Update the message digest with a block of bytes.
  10859. @param in the byte array containing the data.
  10860. @param inOff the offset into the byte array where the data starts.
  10861. @param len the length of the data.
  10862. </member>
  10863. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.Reset">
  10864. Reset the digest back to its initial state. The key, the salt and the
  10865. personal string will remain for further computations.
  10866. </member>
  10867. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.DoFinal(System.Byte[],System.Int32)">
  10868. Close the digest, producing the final digest value. The doFinal() call
  10869. leaves the digest reset. Key, salt and personal string remain.
  10870. @param out the array the digest is to be copied into.
  10871. @param outOffset the offset into the out array the digest is to start at.
  10872. </member>
  10873. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.OutputFinal(System.Byte[],System.Int32,System.Int32)">
  10874. Close the digest, producing the final digest value. The doFinal() call
  10875. leaves the digest reset. Key, salt, personal string remain.
  10876. @param out output array to write the output bytes to.
  10877. @param outOff offset to start writing the bytes at.
  10878. @param outLen the number of output bytes requested.
  10879. </member>
  10880. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake2xsDigest.Output(System.Byte[],System.Int32,System.Int32)">
  10881. Start outputting the results of the final calculation for this digest. Unlike doFinal, this method
  10882. will continue producing output until the Xof is explicitly reset, or signals otherwise.
  10883. @param out output array to write the output bytes to.
  10884. @param outOff offset to start writing the bytes at.
  10885. @param outLen the number of output bytes requested.
  10886. @return the number of bytes written
  10887. </member>
  10888. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.ERR_OUTPUTTING">
  10889. Already outputting error.
  10890. </member>
  10891. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.NUMWORDS">
  10892. Number of Words.
  10893. </member>
  10894. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.ROUNDS">
  10895. Number of Rounds.
  10896. </member>
  10897. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.BLOCKLEN">
  10898. Buffer length.
  10899. </member>
  10900. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CHUNKLEN">
  10901. Chunk length.
  10902. </member>
  10903. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CHUNKSTART">
  10904. ChunkStart Flag.
  10905. </member>
  10906. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CHUNKEND">
  10907. ChunkEnd Flag.
  10908. </member>
  10909. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.PARENT">
  10910. Parent Flag.
  10911. </member>
  10912. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.ROOT">
  10913. Root Flag.
  10914. </member>
  10915. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.KEYEDHASH">
  10916. KeyedHash Flag.
  10917. </member>
  10918. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.DERIVECONTEXT">
  10919. DeriveContext Flag.
  10920. </member>
  10921. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.DERIVEKEY">
  10922. DeriveKey Flag.
  10923. </member>
  10924. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CHAINING0">
  10925. Chaining0 State Locations.
  10926. </member>
  10927. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CHAINING1">
  10928. Chaining1 State Location.
  10929. </member>
  10930. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CHAINING2">
  10931. Chaining2 State Location.
  10932. </member>
  10933. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CHAINING3">
  10934. Chaining3 State Location.
  10935. </member>
  10936. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CHAINING4">
  10937. Chaining4 State Location.
  10938. </member>
  10939. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CHAINING5">
  10940. Chaining5 State Location.
  10941. </member>
  10942. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CHAINING6">
  10943. Chaining6 State Location.
  10944. </member>
  10945. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CHAINING7">
  10946. Chaining7 State Location.
  10947. </member>
  10948. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.IV0">
  10949. IV0 State Locations.
  10950. </member>
  10951. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.IV1">
  10952. IV1 State Location.
  10953. </member>
  10954. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.IV2">
  10955. IV2 State Location.
  10956. </member>
  10957. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.IV3">
  10958. IV3 State Location.
  10959. </member>
  10960. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.COUNT0">
  10961. Count0 State Location.
  10962. </member>
  10963. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.COUNT1">
  10964. Count1 State Location.
  10965. </member>
  10966. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.DATALEN">
  10967. DataLen State Location.
  10968. </member>
  10969. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.FLAGS">
  10970. Flags State Location.
  10971. </member>
  10972. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.SIGMA">
  10973. Message word permutations.
  10974. </member>
  10975. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.IV">
  10976. Blake3 Initialization Vector.
  10977. </member>
  10978. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theBuffer">
  10979. The byte input/output buffer.
  10980. </member>
  10981. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theK">
  10982. The key.
  10983. </member>
  10984. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theChaining">
  10985. The chaining value.
  10986. </member>
  10987. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theV">
  10988. The state.
  10989. </member>
  10990. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theM">
  10991. The message Buffer.
  10992. </member>
  10993. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theIndices">
  10994. The indices.
  10995. </member>
  10996. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theStack">
  10997. The chainingStack.
  10998. </member>
  10999. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theDigestLen">
  11000. The default digestLength.
  11001. </member>
  11002. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_outputting">
  11003. Are we outputting?
  11004. </member>
  11005. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_outputAvailable">
  11006. How many more bytes can we output?
  11007. </member>
  11008. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theMode">
  11009. The current mode.
  11010. </member>
  11011. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theOutputMode">
  11012. The output mode.
  11013. </member>
  11014. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theOutputDataLen">
  11015. The output dataLen.
  11016. </member>
  11017. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theCounter">
  11018. The block counter.
  11019. </member>
  11020. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_theCurrBytes">
  11021. The # of bytes in the current block.
  11022. </member>
  11023. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.m_thePos">
  11024. The position of the next byte in the buffer.
  11025. </member>
  11026. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.#ctor(System.Int32)">
  11027. <param name="pDigestSize">the default digest size (in bits)</param>
  11028. </member>
  11029. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest)">
  11030. Constructor.
  11031. @param pSource the source digest.
  11032. </member>
  11033. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.Blake3Parameters)">
  11034. Initialise.
  11035. @param pParams the parameters.
  11036. </member>
  11037. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.AdjustStack">
  11038. Adjust the stack.
  11039. </member>
  11040. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.CompressFinalBlock(System.Int32)">
  11041. Compress final block.
  11042. @param pDataLen the data length
  11043. </member>
  11044. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.ProcessStack">
  11045. Process the stack.
  11046. </member>
  11047. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.Compress">
  11048. Perform compression.
  11049. </member>
  11050. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.PerformRound">
  11051. Perform a round.
  11052. </member>
  11053. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.AdjustChaining">
  11054. Adjust Chaining after compression.
  11055. </member>
  11056. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.MixG(System.Int32,System.Int32,System.Int32,System.Int32,System.Int32)">
  11057. Mix function G.
  11058. @param msgIdx the message index
  11059. @param posA position A in V
  11060. @param posB position B in V
  11061. @param posC position C in V
  11062. @param posD poistion D in V
  11063. </member>
  11064. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.InitIndices">
  11065. initialise the indices.
  11066. </member>
  11067. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.PermuteIndices">
  11068. PermuteIndices.
  11069. </member>
  11070. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.InitNullKey">
  11071. Initialise null key.
  11072. </member>
  11073. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.InitKey(System.Byte[])">
  11074. Initialise key.
  11075. @param pKey the keyBytes
  11076. </member>
  11077. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.InitKeyFromContext">
  11078. Initialise key from context.
  11079. </member>
  11080. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.InitChunkBlock(System.Int32,System.Boolean)">
  11081. Initialise chunk block.
  11082. @param pDataLen the dataLength
  11083. @param pFinal is this the final chunk?
  11084. </member>
  11085. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.InitParentBlock">
  11086. Initialise parent block.
  11087. </member>
  11088. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.NextOutputBlock">
  11089. Initialise output block.
  11090. </member>
  11091. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.IncrementBlockCount">
  11092. IncrementBlockCount.
  11093. </member>
  11094. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.ResetBlockCount">
  11095. ResetBlockCount.
  11096. </member>
  11097. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Blake3Digest.SetRoot">
  11098. Set root indication.
  11099. </member>
  11100. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.CShakeDigest">
  11101. <summary>
  11102. Customizable SHAKE function.
  11103. </summary>
  11104. </member>
  11105. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.CShakeDigest.#ctor(System.Int32,System.Byte[],System.Byte[])">
  11106. <summary>
  11107. Base constructor
  11108. </summary>
  11109. <param name="bitLength">bit length of the underlying SHAKE function, 128 or 256.</param>
  11110. <param name="N">the function name string, note this is reserved for use by NIST. Avoid using it if not required.</param>
  11111. <param name="S">the customization string - available for local use.</param>
  11112. </member>
  11113. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Dstu7564Digest">
  11114. implementation of Ukrainian DSTU 7564 hash function
  11115. </member>
  11116. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.GeneralDigest">
  11117. base implementation of MD4 family style digest as outlined in
  11118. "Handbook of Applied Cryptography", pages 344 - 347.
  11119. </member>
  11120. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Gost3411Digest">
  11121. implementation of GOST R 34.11-94
  11122. </member>
  11123. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Gost3411Digest.#ctor">
  11124. Standard constructor
  11125. </member>
  11126. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Gost3411Digest.#ctor(System.Byte[])">
  11127. Constructor to allow use of a particular sbox with GOST28147
  11128. @see GOST28147Engine#getSBox(String)
  11129. </member>
  11130. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Gost3411Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Gost3411Digest)">
  11131. Copy constructor. This will copy the state of the provided
  11132. message digest.
  11133. </member>
  11134. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Gost3411Digest.C2">
  11135. reset the chaining variables to the IV values.
  11136. </member>
  11137. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.KeccakDigest">
  11138. <summary>
  11139. Implementation of Keccak based on following KeccakNISTInterface.c from http://keccak.noekeon.org/
  11140. </summary>
  11141. <remarks>
  11142. Following the naming conventions used in the C source code to enable easy review of the implementation.
  11143. </remarks>
  11144. </member>
  11145. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.KeccakDigest.GetByteLength">
  11146. Return the size of block that the compression function is applied to in bytes.
  11147. @return internal byte length of a block.
  11148. </member>
  11149. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.LongDigest">
  11150. Base class for SHA-384 and SHA-512.
  11151. </member>
  11152. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.LongDigest.#ctor">
  11153. Constructor for variable length word
  11154. </member>
  11155. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.LongDigest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.LongDigest)">
  11156. Copy constructor. We are using copy constructors in place
  11157. of the object.Clone() interface as this interface is not
  11158. supported by J2ME.
  11159. </member>
  11160. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.LongDigest.AdjustByteCounts">
  11161. adjust the byte counts so that byteCount2 represents the
  11162. upper long (less 3 bits) word of the byte count.
  11163. </member>
  11164. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD2Digest">
  11165. implementation of MD2
  11166. as outlined in RFC1319 by B.Kaliski from RSA Laboratories April 1992
  11167. </member>
  11168. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD2Digest.AlgorithmName">
  11169. return the algorithm name
  11170. @return the algorithm name
  11171. </member>
  11172. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD2Digest.DoFinal(System.Byte[],System.Int32)">
  11173. Close the digest, producing the final digest value. The doFinal
  11174. call leaves the digest reset.
  11175. @param out the array the digest is to be copied into.
  11176. @param outOff the offset into the out array the digest is to start at.
  11177. </member>
  11178. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD2Digest.Reset">
  11179. reset the digest back to it's initial state.
  11180. </member>
  11181. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD2Digest.Update(System.Byte)">
  11182. update the message digest with a single byte.
  11183. @param in the input byte to be entered.
  11184. </member>
  11185. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD2Digest.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  11186. update the message digest with a block of bytes.
  11187. @param in the byte array containing the data.
  11188. @param inOff the offset into the byte array where the data starts.
  11189. @param len the length of the data.
  11190. </member>
  11191. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD4Digest">
  11192. implementation of MD4 as RFC 1320 by R. Rivest, MIT Laboratory for
  11193. Computer Science and RSA Data Security, Inc.
  11194. <p>
  11195. <b>NOTE</b>: This algorithm is only included for backwards compatibility
  11196. with legacy applications, it's not secure, don't use it for anything new!</p>
  11197. </member>
  11198. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD4Digest.#ctor">
  11199. Standard constructor
  11200. </member>
  11201. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD4Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD4Digest)">
  11202. Copy constructor. This will copy the state of the provided
  11203. message digest.
  11204. </member>
  11205. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD4Digest.Reset">
  11206. reset the chaining variables to the IV values.
  11207. </member>
  11208. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD5Digest">
  11209. implementation of MD5 as outlined in "Handbook of Applied Cryptography", pages 346 - 347.
  11210. </member>
  11211. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD5Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD5Digest)">
  11212. Copy constructor. This will copy the state of the provided
  11213. message digest.
  11214. </member>
  11215. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.MD5Digest.Reset">
  11216. reset the chaining variables to the IV values.
  11217. </member>
  11218. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.NonMemoableDigest">
  11219. Wrapper removes exposure to the IMemoable interface on an IDigest implementation.
  11220. </member>
  11221. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.NonMemoableDigest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  11222. Base constructor.
  11223. @param baseDigest underlying digest to use.
  11224. @exception IllegalArgumentException if baseDigest is null
  11225. </member>
  11226. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.ParallelHash">
  11227. <summary>
  11228. ParallelHash - a hash designed to support the efficient hashing of very long strings, by taking advantage,
  11229. of the parallelism available in modern processors with an optional XOF mode.
  11230. <para>
  11231. From NIST Special Publication 800-185 - SHA-3 Derived Functions:cSHAKE, KMAC, TupleHash and ParallelHash
  11232. </para>
  11233. </summary>
  11234. </member>
  11235. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.ParallelHash.#ctor(System.Int32,System.Byte[],System.Int32)">
  11236. Base constructor.
  11237. @param bitLength bit length of the underlying SHAKE function, 128 or 256.
  11238. @param S the customization string - available for local use.
  11239. @param B the blocksize (in bytes) for hashing.
  11240. </member>
  11241. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD128Digest">
  11242. implementation of RipeMD128
  11243. </member>
  11244. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD128Digest.#ctor">
  11245. Standard constructor
  11246. </member>
  11247. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD128Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD128Digest)">
  11248. Copy constructor. This will copy the state of the provided
  11249. message digest.
  11250. </member>
  11251. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD128Digest.Reset">
  11252. reset the chaining variables to the IV values.
  11253. </member>
  11254. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD160Digest">
  11255. implementation of RipeMD see,
  11256. http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html
  11257. </member>
  11258. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD160Digest.#ctor">
  11259. Standard constructor
  11260. </member>
  11261. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD160Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD160Digest)">
  11262. Copy constructor. This will copy the state of the provided
  11263. message digest.
  11264. </member>
  11265. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD160Digest.Reset">
  11266. reset the chaining variables to the IV values.
  11267. </member>
  11268. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD256Digest">
  11269. <remarks>
  11270. <p>Implementation of RipeMD256.</p>
  11271. <p><b>Note:</b> this algorithm offers the same level of security as RipeMD128.</p>
  11272. </remarks>
  11273. </member>
  11274. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD256Digest.#ctor">
  11275. <summary> Standard constructor</summary>
  11276. </member>
  11277. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD256Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD256Digest)">
  11278. <summary> Copy constructor. This will copy the state of the provided
  11279. message digest.
  11280. </summary>
  11281. </member>
  11282. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD256Digest.Reset">
  11283. <summary> reset the chaining variables to the IV values.</summary>
  11284. </member>
  11285. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD320Digest">
  11286. <remarks>
  11287. <p>Implementation of RipeMD 320.</p>
  11288. <p><b>Note:</b> this algorithm offers the same level of security as RipeMD160.</p>
  11289. </remarks>
  11290. </member>
  11291. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD320Digest.#ctor">
  11292. <summary> Standard constructor</summary>
  11293. </member>
  11294. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD320Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD320Digest)">
  11295. <summary> Copy constructor. This will copy the state of the provided
  11296. message digest.
  11297. </summary>
  11298. </member>
  11299. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.RipeMD320Digest.Reset">
  11300. <summary> reset the chaining variables to the IV values.</summary>
  11301. </member>
  11302. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha1Digest">
  11303. implementation of SHA-1 as outlined in "Handbook of Applied Cryptography", pages 346 - 349.
  11304. It is interesting to ponder why the, apart from the extra IV, the other difference here from MD5
  11305. is the "endianness" of the word processing!
  11306. </member>
  11307. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha1Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha1Digest)">
  11308. Copy constructor. This will copy the state of the provided
  11309. message digest.
  11310. </member>
  11311. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha1Digest.Reset">
  11312. reset the chaining variables
  11313. </member>
  11314. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha224Digest">
  11315. SHA-224 as described in RFC 3874
  11316. <pre>
  11317. block word digest
  11318. SHA-1 512 32 160
  11319. SHA-224 512 32 224
  11320. SHA-256 512 32 256
  11321. SHA-384 1024 64 384
  11322. SHA-512 1024 64 512
  11323. </pre>
  11324. </member>
  11325. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha224Digest.#ctor">
  11326. Standard constructor
  11327. </member>
  11328. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha224Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha224Digest)">
  11329. Copy constructor. This will copy the state of the provided
  11330. message digest.
  11331. </member>
  11332. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha224Digest.Reset">
  11333. reset the chaining variables
  11334. </member>
  11335. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha256Digest">
  11336. Draft FIPS 180-2 implementation of SHA-256. <b>Note:</b> As this is
  11337. based on a draft this implementation is subject to change.
  11338. <pre>
  11339. block word digest
  11340. SHA-1 512 32 160
  11341. SHA-256 512 32 256
  11342. SHA-384 1024 64 384
  11343. SHA-512 1024 64 512
  11344. </pre>
  11345. </member>
  11346. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha256Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha256Digest)">
  11347. Copy constructor. This will copy the state of the provided
  11348. message digest.
  11349. </member>
  11350. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha256Digest.Reset">
  11351. reset the chaining variables
  11352. </member>
  11353. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha384Digest">
  11354. Draft FIPS 180-2 implementation of SHA-384. <b>Note:</b> As this is
  11355. based on a draft this implementation is subject to change.
  11356. <pre>
  11357. block word digest
  11358. SHA-1 512 32 160
  11359. SHA-256 512 32 256
  11360. SHA-384 1024 64 384
  11361. SHA-512 1024 64 512
  11362. </pre>
  11363. </member>
  11364. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha384Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha384Digest)">
  11365. Copy constructor. This will copy the state of the provided
  11366. message digest.
  11367. </member>
  11368. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha384Digest.Reset">
  11369. reset the chaining variables
  11370. </member>
  11371. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha3Digest">
  11372. <summary>
  11373. Implementation of SHA-3 based on following KeccakNISTInterface.c from http://keccak.noekeon.org/
  11374. </summary>
  11375. <remarks>
  11376. Following the naming conventions used in the C source code to enable easy review of the implementation.
  11377. </remarks>
  11378. </member>
  11379. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha512Digest">
  11380. Draft FIPS 180-2 implementation of SHA-512. <b>Note:</b> As this is
  11381. based on a draft this implementation is subject to change.
  11382. <pre>
  11383. block word digest
  11384. SHA-1 512 32 160
  11385. SHA-256 512 32 256
  11386. SHA-384 1024 64 384
  11387. SHA-512 1024 64 512
  11388. </pre>
  11389. </member>
  11390. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha512Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha512Digest)">
  11391. Copy constructor. This will copy the state of the provided
  11392. message digest.
  11393. </member>
  11394. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha512Digest.Reset">
  11395. reset the chaining variables
  11396. </member>
  11397. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha512tDigest">
  11398. FIPS 180-4 implementation of SHA-512/t
  11399. </member>
  11400. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha512tDigest.#ctor(System.Int32)">
  11401. Standard constructor
  11402. </member>
  11403. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha512tDigest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha512tDigest)">
  11404. Copy constructor. This will copy the state of the provided
  11405. message digest.
  11406. </member>
  11407. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.Sha512tDigest.Reset">
  11408. reset the chaining variables
  11409. </member>
  11410. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.ShakeDigest">
  11411. <summary>
  11412. Implementation of SHAKE based on following KeccakNISTInterface.c from http://keccak.noekeon.org/
  11413. </summary>
  11414. <remarks>
  11415. Following the naming conventions used in the C source code to enable easy review of the implementation.
  11416. </remarks>
  11417. </member>
  11418. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.ShortenedDigest">
  11419. Wrapper class that reduces the output length of a particular digest to
  11420. only the first n bytes of the digest function.
  11421. </member>
  11422. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.ShortenedDigest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.Int32)">
  11423. Base constructor.
  11424. @param baseDigest underlying digest to use.
  11425. @param length length in bytes of the output of doFinal.
  11426. @exception ArgumentException if baseDigest is null, or length is greater than baseDigest.GetDigestSize().
  11427. </member>
  11428. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinDigest">
  11429. <summary>
  11430. Implementation of the Skein parameterised hash function in 256, 512 and 1024 bit block sizes,
  11431. based on the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine">Threefish</see> tweakable block cipher.
  11432. </summary>
  11433. <remarks>
  11434. This is the 1.3 version of Skein defined in the Skein hash function submission to the NIST SHA-3
  11435. competition in October 2010.
  11436. <p/>
  11437. Skein was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir
  11438. Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker.
  11439. </remarks>
  11440. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine"/>
  11441. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/>
  11442. </member>
  11443. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_256">
  11444. <summary>
  11445. 256 bit block size - Skein-256
  11446. </summary>
  11447. </member>
  11448. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_512">
  11449. <summary>
  11450. 512 bit block size - Skein-512
  11451. </summary>
  11452. </member>
  11453. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_1024">
  11454. <summary>
  11455. 1024 bit block size - Skein-1024
  11456. </summary>
  11457. </member>
  11458. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinDigest.#ctor(System.Int32,System.Int32)">
  11459. <summary>
  11460. Constructs a Skein digest with an internal state size and output size.
  11461. </summary>
  11462. <param name="stateSizeBits">the internal state size in bits - one of <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_256"/> <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_512"/> or
  11463. <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_1024"/>.</param>
  11464. <param name="digestSizeBits">the output/digest size to produce in bits, which must be an integral number of
  11465. bytes.</param>
  11466. </member>
  11467. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinDigest.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters)">
  11468. <summary>
  11469. Optionally initialises the Skein digest with the provided parameters.
  11470. </summary>
  11471. See <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters"></see> for details on the parameterisation of the Skein hash function.
  11472. <param name="parameters">the parameters to apply to this engine, or <code>null</code> to use no parameters.</param>
  11473. </member>
  11474. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine">
  11475. <summary>
  11476. Implementation of the Skein family of parameterised hash functions in 256, 512 and 1024 bit block
  11477. sizes, based on the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine">Threefish</see> tweakable block cipher.
  11478. </summary>
  11479. <remarks>
  11480. This is the 1.3 version of Skein defined in the Skein hash function submission to the NIST SHA-3
  11481. competition in October 2010.
  11482. <p/>
  11483. Skein was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir
  11484. Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker.
  11485. <p/>
  11486. This implementation is the basis for <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinDigest"/> and <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SkeinMac"/>, implementing the
  11487. parameter based configuration system that allows Skein to be adapted to multiple applications. <br/>
  11488. Initialising the engine with <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/> allows standard and arbitrary parameters to
  11489. be applied during the Skein hash function.
  11490. <p/>
  11491. Implemented:
  11492. <ul>
  11493. <li>256, 512 and 1024 bit internal states.</li>
  11494. <li>Full 96 bit input length.</li>
  11495. <li>Parameters defined in the Skein specification, and arbitrary other pre and post message
  11496. parameters.</li>
  11497. <li>Arbitrary output size in 1 byte intervals.</li>
  11498. </ul>
  11499. <p/>
  11500. Not implemented:
  11501. <ul>
  11502. <li>Sub-byte length input (bit padding).</li>
  11503. <li>Tree hashing.</li>
  11504. </ul>
  11505. </remarks>
  11506. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/>
  11507. </member>
  11508. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_256">
  11509. <summary>
  11510. 256 bit block size - Skein-256
  11511. </summary>
  11512. </member>
  11513. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_512">
  11514. <summary>
  11515. 512 bit block size - Skein-512
  11516. </summary>
  11517. </member>
  11518. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_1024">
  11519. <summary>
  11520. 1024 bit block size - Skein-1024
  11521. </summary>
  11522. </member>
  11523. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.PARAM_TYPE_KEY">
  11524. The parameter type for the Skein key.
  11525. </member>
  11526. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.PARAM_TYPE_CONFIG">
  11527. The parameter type for the Skein configuration block.
  11528. </member>
  11529. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.PARAM_TYPE_MESSAGE">
  11530. The parameter type for the message.
  11531. </member>
  11532. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.PARAM_TYPE_OUTPUT">
  11533. The parameter type for the output transformation.
  11534. </member>
  11535. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.InitialStates">
  11536. Precalculated UBI(CFG) states for common state/output combinations without key or other
  11537. pre-message params.
  11538. </member>
  11539. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.LOW_RANGE">
  11540. Point at which position might overflow long, so switch to add with carry logic
  11541. </member>
  11542. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.T1_FINAL">
  11543. Bit 127 = final
  11544. </member>
  11545. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.T1_FIRST">
  11546. Bit 126 = first
  11547. </member>
  11548. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.tweak">
  11549. UBI uses a 128 bit tweak
  11550. </member>
  11551. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.extendedPosition">
  11552. Whether 64 bit position exceeded
  11553. </member>
  11554. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.AdvancePosition(System.Int32)">
  11555. Advances the position in the tweak by the specified value.
  11556. </member>
  11557. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.UBI">
  11558. The Unique Block Iteration chaining mode.
  11559. </member>
  11560. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.UBI.currentBlock">
  11561. Buffer for the current block of message data
  11562. </member>
  11563. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.UBI.currentOffset">
  11564. Offset into the current message block
  11565. </member>
  11566. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.UBI.message">
  11567. Buffer for message words for feedback into encrypted block
  11568. </member>
  11569. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.threefish">
  11570. Underlying Threefish tweakable block cipher
  11571. </member>
  11572. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.outputSizeBytes">
  11573. Size of the digest output, in bytes
  11574. </member>
  11575. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.chain">
  11576. The current chaining/state value
  11577. </member>
  11578. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.initialState">
  11579. The initial state value
  11580. </member>
  11581. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.key">
  11582. The (optional) key parameter
  11583. </member>
  11584. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.preMessageParameters">
  11585. Parameters to apply prior to the message
  11586. </member>
  11587. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.postMessageParameters">
  11588. Parameters to apply after the message, but prior to output
  11589. </member>
  11590. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.ubi">
  11591. The current UBI operation
  11592. </member>
  11593. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.singleByte">
  11594. Buffer for single byte update method
  11595. </member>
  11596. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.#ctor(System.Int32,System.Int32)">
  11597. <summary>
  11598. Constructs a Skein digest with an internal state size and output size.
  11599. </summary>
  11600. <param name="blockSizeBits">the internal state size in bits - one of <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_256"/> <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_512"/> or
  11601. <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_1024"/>.</param>
  11602. <param name="outputSizeBits">the output/digest size to produce in bits, which must be an integral number of
  11603. bytes.</param>
  11604. </member>
  11605. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine)">
  11606. <summary>
  11607. Creates a SkeinEngine as an exact copy of an existing instance.
  11608. </summary>
  11609. </member>
  11610. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters)">
  11611. <summary>
  11612. Initialises the Skein engine with the provided parameters. See <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/> for
  11613. details on the parameterisation of the Skein hash function.
  11614. </summary>
  11615. <param name="parameters">the parameters to apply to this engine, or <code>null</code> to use no parameters.</param>
  11616. </member>
  11617. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.CreateInitialState">
  11618. Calculate the initial (pre message block) chaining state.
  11619. </member>
  11620. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine.Reset">
  11621. <summary>
  11622. Reset the engine to the initial state (with the key and any pre-message parameters , ready to
  11623. accept message input.
  11624. </summary>
  11625. </member>
  11626. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SM3Digest">
  11627. <summary>
  11628. Implementation of Chinese SM3 digest as described at
  11629. http://tools.ietf.org/html/draft-shen-sm3-hash-00
  11630. and at .... ( Chinese PDF )
  11631. </summary>
  11632. <remarks>
  11633. The specification says "process a bit stream",
  11634. but this is written to process bytes in blocks of 4,
  11635. meaning this will process 32-bit word groups.
  11636. But so do also most other digest specifications,
  11637. including the SHA-256 which was a origin for
  11638. this specification.
  11639. </remarks>
  11640. </member>
  11641. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SM3Digest.#ctor">
  11642. <summary>
  11643. Standard constructor
  11644. </summary>
  11645. </member>
  11646. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SM3Digest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SM3Digest)">
  11647. <summary>
  11648. Copy constructor. This will copy the state of the provided
  11649. message digest.
  11650. </summary>
  11651. </member>
  11652. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SM3Digest.Reset">
  11653. <summary>
  11654. reset the chaining variables
  11655. </summary>
  11656. </member>
  11657. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.TigerDigest">
  11658. implementation of Tiger based on:
  11659. <a href="http://www.cs.technion.ac.il/~biham/Reports/Tiger">
  11660. http://www.cs.technion.ac.il/~biham/Reports/Tiger</a>
  11661. </member>
  11662. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.TigerDigest.#ctor">
  11663. Standard constructor
  11664. </member>
  11665. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.TigerDigest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.TigerDigest)">
  11666. Copy constructor. This will copy the state of the provided
  11667. message digest.
  11668. </member>
  11669. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.TigerDigest.Reset">
  11670. reset the chaining variables
  11671. </member>
  11672. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.TupleHash">
  11673. <summary>
  11674. TupleHash - a hash designed to simply hash a tuple of input strings, any or all of which may be empty strings,
  11675. in an unambiguous way with an optional XOF mode.
  11676. <para>
  11677. From NIST Special Publication 800-185 - SHA-3 Derived Functions:cSHAKE, KMAC, TupleHash and ParallelHash
  11678. </para>
  11679. </summary>
  11680. </member>
  11681. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.TupleHash.#ctor(System.Int32,System.Byte[])">
  11682. Base constructor.
  11683. @param bitLength bit length of the underlying SHAKE function, 128 or 256.
  11684. @param S the customization string - available for local use.
  11685. </member>
  11686. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.WhirlpoolDigest">
  11687. Implementation of WhirlpoolDigest, based on Java source published by Barreto and Rijmen.
  11688. </member>
  11689. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.WhirlpoolDigest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.WhirlpoolDigest)">
  11690. Copy constructor. This will copy the state of the provided message digest.
  11691. </member>
  11692. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.WhirlpoolDigest.Reset">
  11693. Reset the chaining variables
  11694. </member>
  11695. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.EC.CustomNamedCurves">
  11696. <summary>Elliptic curve registry for various customized curve implementations.</summary>
  11697. </member>
  11698. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.EC.CustomNamedCurves.GetByName(System.String)">
  11699. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given name.</summary>
  11700. <param name="name">The name of the curve.</param>
  11701. </member>
  11702. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.EC.CustomNamedCurves.GetByNameLazy(System.String)">
  11703. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given name.</summary>
  11704. <remarks>
  11705. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  11706. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  11707. </remarks>
  11708. <param name="name">The name of the curve.</param>
  11709. </member>
  11710. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.EC.CustomNamedCurves.GetByOid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  11711. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/> for the curve with the given
  11712. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  11713. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  11714. </member>
  11715. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.EC.CustomNamedCurves.GetByOidLazy(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  11716. <summary>Look up an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParametersHolder"/> for the curve with the given
  11717. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  11718. <remarks>
  11719. Allows accessing the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">curve</see> without necessarily triggering the creation of the
  11720. full <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9.X9ECParameters"/>.
  11721. </remarks>
  11722. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  11723. </member>
  11724. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.EC.CustomNamedCurves.GetName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  11725. <summary>Look up the name of the curve with the given <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see>.</summary>
  11726. <param name="oid">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> for the curve.</param>
  11727. </member>
  11728. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.EC.CustomNamedCurves.GetOid(System.String)">
  11729. <summary>Look up the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier">OID</see> of the curve with the given name.</summary>
  11730. <param name="name">The name of the curve.</param>
  11731. </member>
  11732. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.EC.CustomNamedCurves.Names">
  11733. <summary>Enumerate the available curve names in this registry.</summary>
  11734. </member>
  11735. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding">
  11736. ISO 9796-1 padding. Note in the light of recent results you should
  11737. only use this with RSA (rather than the "simpler" Rabin keys) and you
  11738. should never use it with anything other than a hash (ie. even if the
  11739. message is small don't sign the message, sign it's hash) or some "random"
  11740. value. See your favorite search engine for details.
  11741. </member>
  11742. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding.GetInputBlockSize">
  11743. return the input block size. The largest message we can process
  11744. is (key_size_in_bits + 3)/16, which in our world comes to
  11745. key_size_in_bytes / 2.
  11746. </member>
  11747. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding.GetOutputBlockSize">
  11748. return the maximum possible size for the output.
  11749. </member>
  11750. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding.SetPadBits(System.Int32)">
  11751. set the number of bits in the next message to be treated as
  11752. pad bits.
  11753. </member>
  11754. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding.GetPadBits">
  11755. retrieve the number of pad bits in the last decoded message.
  11756. </member>
  11757. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding.DecodeBlock(System.Byte[],System.Int32,System.Int32)">
  11758. @exception InvalidCipherTextException if the decrypted block is not a valid ISO 9796 bit string
  11759. </member>
  11760. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.OaepEncoding">
  11761. Optimal Asymmetric Encryption Padding (OAEP) - see PKCS 1 V 2.
  11762. </member>
  11763. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.OaepEncoding.DecodeBlock(System.Byte[],System.Int32,System.Int32)">
  11764. @exception InvalidCipherTextException if the decrypted block turns out to
  11765. be badly formatted.
  11766. </member>
  11767. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.OaepEncoding.MaskGeneratorFunction1(System.Byte[],System.Int32,System.Int32,System.Int32)">
  11768. mask generator function, as described in PKCS1v2.
  11769. </member>
  11770. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding">
  11771. this does your basic Pkcs 1 v1.5 padding - whether or not you should be using this
  11772. depends on your application - see Pkcs1 Version 2 for details.
  11773. </member>
  11774. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.StrictLengthEnabledProperty">
  11775. some providers fail to include the leading zero in PKCS1 encoded blocks. If you need to
  11776. work with one of these set the system property Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs1.Strict to false.
  11777. </member>
  11778. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.StrictLengthEnabled">
  11779. The same effect can be achieved by setting the static property directly
  11780. <p>
  11781. The static property is checked during construction of the encoding object, it is set to
  11782. true by default.
  11783. </p>
  11784. </member>
  11785. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher)">
  11786. Basic constructor.
  11787. @param cipher
  11788. </member>
  11789. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,System.Int32)">
  11790. Constructor for decryption with a fixed plaintext length.
  11791. @param cipher The cipher to use for cryptographic operation.
  11792. @param pLen Length of the expected plaintext.
  11793. </member>
  11794. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,System.Byte[])">
  11795. Constructor for decryption with a fixed plaintext length and a fallback
  11796. value that is returned, if the padding is incorrect.
  11797. @param cipher
  11798. The cipher to use for cryptographic operation.
  11799. @param fallback
  11800. The fallback value, we don't to a arraycopy here.
  11801. </member>
  11802. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.CheckPkcs1Encoding(System.Byte[],System.Int32)">
  11803. Checks if the argument is a correctly PKCS#1.5 encoded Plaintext
  11804. for encryption.
  11805. @param encoded The Plaintext.
  11806. @param pLen Expected length of the plaintext.
  11807. @return Either 0, if the encoding is correct, or -1, if it is incorrect.
  11808. </member>
  11809. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.DecodeBlockOrRandom(System.Byte[],System.Int32,System.Int32)">
  11810. Decode PKCS#1.5 encoding, and return a random value if the padding is not correct.
  11811. @param in The encrypted block.
  11812. @param inOff Offset in the encrypted block.
  11813. @param inLen Length of the encrypted block.
  11814. @param pLen Length of the desired output.
  11815. @return The plaintext without padding, or a random value if the padding was incorrect.
  11816. @throws InvalidCipherTextException
  11817. </member>
  11818. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.DecodeBlock(System.Byte[],System.Int32,System.Int32)">
  11819. @exception InvalidCipherTextException if the decrypted block is not in Pkcs1 format.
  11820. </member>
  11821. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.AesEngine">
  11822. an implementation of the AES (Rijndael), from FIPS-197.
  11823. <p>
  11824. For further details see: <a href="http://csrc.nist.gov/encryption/aes/">http://csrc.nist.gov/encryption/aes/</a>.
  11825. This implementation is based on optimizations from Dr. Brian Gladman's paper and C code at
  11826. <a href="http://fp.gladman.plus.com/cryptography_technology/rijndael/">http://fp.gladman.plus.com/cryptography_technology/rijndael/</a>
  11827. There are three levels of tradeoff of speed vs memory
  11828. Because java has no preprocessor, they are written as three separate classes from which to choose
  11829. The fastest uses 8Kbytes of static tables to precompute round calculations, 4 256 word tables for encryption
  11830. and 4 for decryption.
  11831. The middle performance version uses only one 256 word table for each, for a total of 2Kbytes,
  11832. adding 12 rotate operations per round to compute the values contained in the other tables from
  11833. the contents of the first.
  11834. The slowest version uses no static tables at all and computes the values in each round.
  11835. </p>
  11836. <p>
  11837. This file contains the middle performance version with 2Kbytes of static tables for round precomputation.
  11838. </p>
  11839. </member>
  11840. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.AesEngine.GenerateWorkingKey(System.Byte[],System.Boolean)">
  11841. Calculate the necessary round keys
  11842. The number of calculations depends on key size and block size
  11843. AES specified a fixed block size of 128 bits and key sizes 128/192/256 bits
  11844. This code is written assuming those are the only possible values
  11845. </member>
  11846. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.AesEngine.#ctor">
  11847. default constructor - 128 bit block size.
  11848. </member>
  11849. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.AesEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  11850. initialise an AES cipher.
  11851. @param forEncryption whether or not we are for encryption.
  11852. @param parameters the parameters required to set up the cipher.
  11853. @exception ArgumentException if the parameters argument is
  11854. inappropriate.
  11855. </member>
  11856. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.AesLightEngine">
  11857. an implementation of the AES (Rijndael), from FIPS-197.
  11858. <p>
  11859. For further details see: <a href="http://csrc.nist.gov/encryption/aes/">http://csrc.nist.gov/encryption/aes/</a>.
  11860. This implementation is based on optimizations from Dr. Brian Gladman's paper and C code at
  11861. <a href="http://fp.gladman.plus.com/cryptography_technology/rijndael/">http://fp.gladman.plus.com/cryptography_technology/rijndael/</a>
  11862. There are three levels of tradeoff of speed vs memory
  11863. Because java has no preprocessor, they are written as three separate classes from which to choose
  11864. The fastest uses 8Kbytes of static tables to precompute round calculations, 4 256 word tables for encryption
  11865. and 4 for decryption.
  11866. The middle performance version uses only one 256 word table for each, for a total of 2Kbytes,
  11867. adding 12 rotate operations per round to compute the values contained in the other tables from
  11868. the contents of the first
  11869. The slowest version uses no static tables at all and computes the values
  11870. in each round.
  11871. </p>
  11872. <p>
  11873. This file contains the slowest performance version with no static tables
  11874. for round precomputation, but it has the smallest foot print.
  11875. </p>
  11876. </member>
  11877. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.AesLightEngine.GenerateWorkingKey(System.Byte[],System.Boolean)">
  11878. Calculate the necessary round keys
  11879. The number of calculations depends on key size and block size
  11880. AES specified a fixed block size of 128 bits and key sizes 128/192/256 bits
  11881. This code is written assuming those are the only possible values
  11882. </member>
  11883. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.AesLightEngine.#ctor">
  11884. default constructor - 128 bit block size.
  11885. </member>
  11886. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.AesLightEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  11887. initialise an AES cipher.
  11888. @param forEncryption whether or not we are for encryption.
  11889. @param parameters the parameters required to set up the cipher.
  11890. @exception ArgumentException if the parameters argument is
  11891. inappropriate.
  11892. </member>
  11893. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.AesWrapEngine">
  11894. <remarks>
  11895. An implementation of the AES Key Wrapper from the NIST Key Wrap Specification.
  11896. <p/>
  11897. For further details see: <a href="http://csrc.nist.gov/encryption/kms/key-wrap.pdf">http://csrc.nist.gov/encryption/kms/key-wrap.pdf</a>.
  11898. </remarks>
  11899. </member>
  11900. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.AriaEngine">
  11901. RFC 5794.
  11902. ARIA is a 128-bit block cipher with 128-, 192-, and 256-bit keys.
  11903. </member>
  11904. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.BlowfishEngine">
  11905. A class that provides Blowfish key encryption operations,
  11906. such as encoding data and generating keys.
  11907. All the algorithms herein are from Applied Cryptography
  11908. and implement a simplified cryptography interface.
  11909. </member>
  11910. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.BlowfishEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  11911. initialise a Blowfish cipher.
  11912. @param forEncryption whether or not we are for encryption.
  11913. @param parameters the parameters required to set up the cipher.
  11914. @exception ArgumentException if the parameters argument is
  11915. inappropriate.
  11916. </member>
  11917. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.BlowfishEngine.ProcessTable(System.UInt32,System.UInt32,System.UInt32[])">
  11918. apply the encryption cycle to each value pair in the table.
  11919. </member>
  11920. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.CamelliaEngine">
  11921. Camellia - based on RFC 3713.
  11922. </member>
  11923. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.CamelliaLightEngine">
  11924. Camellia - based on RFC 3713, smaller implementation, about half the size of CamelliaEngine.
  11925. </member>
  11926. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.CamelliaWrapEngine">
  11927. <remarks>
  11928. An implementation of the Camellia key wrapper based on RFC 3657/RFC 3394.
  11929. <p/>
  11930. For further details see: <a href="http://www.ietf.org/rfc/rfc3657.txt">http://www.ietf.org/rfc/rfc3657.txt</a>.
  11931. </remarks>
  11932. </member>
  11933. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Cast5Engine">
  11934. A class that provides CAST key encryption operations,
  11935. such as encoding data and generating keys.
  11936. All the algorithms herein are from the Internet RFC's
  11937. RFC2144 - Cast5 (64bit block, 40-128bit key)
  11938. RFC2612 - CAST6 (128bit block, 128-256bit key)
  11939. and implement a simplified cryptography interface.
  11940. </member>
  11941. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Cast5Engine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  11942. initialise a CAST cipher.
  11943. @param forEncryption whether or not we are for encryption.
  11944. @param parameters the parameters required to set up the cipher.
  11945. @exception ArgumentException if the parameters argument is
  11946. inappropriate.
  11947. </member>
  11948. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Cast5Engine.F1(System.UInt32,System.UInt32,System.Int32)">
  11949. The first of the three processing functions for the
  11950. encryption and decryption.
  11951. @param D the input to be processed
  11952. @param Kmi the mask to be used from Km[n]
  11953. @param Kri the rotation value to be used
  11954. </member>
  11955. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Cast5Engine.F2(System.UInt32,System.UInt32,System.Int32)">
  11956. The second of the three processing functions for the
  11957. encryption and decryption.
  11958. @param D the input to be processed
  11959. @param Kmi the mask to be used from Km[n]
  11960. @param Kri the rotation value to be used
  11961. </member>
  11962. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Cast5Engine.F3(System.UInt32,System.UInt32,System.Int32)">
  11963. The third of the three processing functions for the
  11964. encryption and decryption.
  11965. @param D the input to be processed
  11966. @param Kmi the mask to be used from Km[n]
  11967. @param Kri the rotation value to be used
  11968. </member>
  11969. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Cast5Engine.CAST_Encipher(System.UInt32,System.UInt32,System.UInt32[])">
  11970. Does the 16 rounds to encrypt the block.
  11971. @param L0 the LH-32bits of the plaintext block
  11972. @param R0 the RH-32bits of the plaintext block
  11973. </member>
  11974. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Cast6Engine">
  11975. A class that provides CAST6 key encryption operations,
  11976. such as encoding data and generating keys.
  11977. All the algorithms herein are from the Internet RFC
  11978. RFC2612 - CAST6 (128bit block, 128-256bit key)
  11979. and implement a simplified cryptography interface.
  11980. </member>
  11981. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Cast6Engine.CAST_Encipher(System.UInt32,System.UInt32,System.UInt32,System.UInt32,System.UInt32[])">
  11982. Does the 12 quad rounds rounds to encrypt the block.
  11983. @param A the 00-31 bits of the plaintext block
  11984. @param B the 32-63 bits of the plaintext block
  11985. @param C the 64-95 bits of the plaintext block
  11986. @param D the 96-127 bits of the plaintext block
  11987. @param result the resulting ciphertext
  11988. </member>
  11989. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Cast6Engine.CAST_Decipher(System.UInt32,System.UInt32,System.UInt32,System.UInt32,System.UInt32[])">
  11990. Does the 12 quad rounds rounds to decrypt the block.
  11991. @param A the 00-31 bits of the ciphertext block
  11992. @param B the 32-63 bits of the ciphertext block
  11993. @param C the 64-95 bits of the ciphertext block
  11994. @param D the 96-127 bits of the ciphertext block
  11995. @param result the resulting plaintext
  11996. </member>
  11997. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ChaCha7539Engine">
  11998. <summary>
  11999. Implementation of Daniel J. Bernstein's ChaCha stream cipher.
  12000. </summary>
  12001. </member>
  12002. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ChaCha7539Engine.#ctor">
  12003. <summary>
  12004. Creates a 20 rounds ChaCha engine.
  12005. </summary>
  12006. </member>
  12007. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ChaChaEngine">
  12008. <summary>
  12009. Implementation of Daniel J. Bernstein's ChaCha stream cipher.
  12010. </summary>
  12011. </member>
  12012. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ChaChaEngine.#ctor">
  12013. <summary>
  12014. Creates a 20 rounds ChaCha engine.
  12015. </summary>
  12016. </member>
  12017. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ChaChaEngine.#ctor(System.Int32)">
  12018. <summary>
  12019. Creates a ChaCha engine with a specific number of rounds.
  12020. </summary>
  12021. <param name="rounds">the number of rounds (must be an even number).</param>
  12022. </member>
  12023. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeEngine">
  12024. <remarks>A class that provides a basic DESede (or Triple DES) engine.</remarks>
  12025. </member>
  12026. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12027. initialise a DESede cipher.
  12028. @param forEncryption whether or not we are for encryption.
  12029. @param parameters the parameters required to set up the cipher.
  12030. @exception ArgumentException if the parameters argument is
  12031. inappropriate.
  12032. </member>
  12033. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine">
  12034. * Wrap keys according to
  12035. * <a href="http://www.ietf.org/internet-drafts/draft-ietf-smime-key-wrap-01.txt">
  12036. * draft-ietf-smime-key-wrap-01.txt</a>.
  12037. * <p>
  12038. * Note:
  12039. * <ul>
  12040. * <li>this is based on a draft, and as such is subject to change - don't use this class for anything requiring long term storage.</li>
  12041. * <li>if you are using this to wrap triple-des keys you need to set the
  12042. * parity bits on the key and, if it's a two-key triple-des key, pad it
  12043. * yourself.</li>
  12044. * </ul>
  12045. * </p>
  12046. </member>
  12047. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.engine">
  12048. Field engine
  12049. </member>
  12050. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.param">
  12051. Field param
  12052. </member>
  12053. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.paramPlusIV">
  12054. Field paramPlusIV
  12055. </member>
  12056. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.iv">
  12057. Field iv
  12058. </member>
  12059. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.forWrapping">
  12060. Field forWrapping
  12061. </member>
  12062. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.IV2">
  12063. Field IV2
  12064. </member>
  12065. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12066. Method init
  12067. @param forWrapping
  12068. @param param
  12069. </member>
  12070. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.AlgorithmName">
  12071. Method GetAlgorithmName
  12072. @return
  12073. </member>
  12074. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.Wrap(System.Byte[],System.Int32,System.Int32)">
  12075. Method wrap
  12076. @param in
  12077. @param inOff
  12078. @param inLen
  12079. @return
  12080. </member>
  12081. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.Unwrap(System.Byte[],System.Int32,System.Int32)">
  12082. Method unwrap
  12083. @param in
  12084. @param inOff
  12085. @param inLen
  12086. @return
  12087. @throws InvalidCipherTextException
  12088. </member>
  12089. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.CalculateCmsKeyChecksum(System.Byte[])">
  12090. Some key wrap algorithms make use of the Key Checksum defined
  12091. in CMS [CMS-Algorithms]. This is used to provide an integrity
  12092. check value for the key being wrapped. The algorithm is
  12093. - Compute the 20 octet SHA-1 hash on the key being wrapped.
  12094. - Use the first 8 octets of this hash as the checksum value.
  12095. @param key
  12096. @return
  12097. @throws Exception
  12098. @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum
  12099. </member>
  12100. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.CheckCmsKeyChecksum(System.Byte[],System.Byte[])">
  12101. @param key
  12102. @param checksum
  12103. @return
  12104. @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum
  12105. </member>
  12106. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEngine">
  12107. <remarks>A class that provides a basic DES engine.</remarks>
  12108. </member>
  12109. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12110. initialise a DES cipher.
  12111. @param forEncryption whether or not we are for encryption.
  12112. @param parameters the parameters required to set up the cipher.
  12113. @exception ArgumentException if the parameters argument is
  12114. inappropriate.
  12115. </member>
  12116. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEngine.bytebit">
  12117. what follows is mainly taken from "Applied Cryptography", by
  12118. Bruce Schneier, however it also bears great resemblance to Richard
  12119. Outerbridge's D3DES...
  12120. </member>
  12121. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.DesEngine.GenerateWorkingKey(System.Boolean,System.Byte[])">
  12122. Generate an integer based working key based on our secret key
  12123. and what we processing we are planning to do.
  12124. Acknowledgements for this routine go to James Gillogly and Phil Karn.
  12125. (whoever, and wherever they are!).
  12126. </member>
  12127. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Dstu7624Engine">
  12128. implementation of DSTU 7624 (Kalyna)
  12129. </member>
  12130. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ElGamalEngine">
  12131. this does your basic ElGamal algorithm.
  12132. </member>
  12133. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ElGamalEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12134. initialise the ElGamal engine.
  12135. @param forEncryption true if we are encrypting, false otherwise.
  12136. @param param the necessary ElGamal key parameters.
  12137. </member>
  12138. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ElGamalEngine.GetInputBlockSize">
  12139. Return the maximum size for an input block to this engine.
  12140. For ElGamal this is always one byte less than the size of P on
  12141. encryption, and twice the length as the size of P on decryption.
  12142. @return maximum size for an input block.
  12143. </member>
  12144. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ElGamalEngine.GetOutputBlockSize">
  12145. Return the maximum size for an output block to this engine.
  12146. For ElGamal this is always one byte less than the size of P on
  12147. decryption, and twice the length as the size of P on encryption.
  12148. @return maximum size for an output block.
  12149. </member>
  12150. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ElGamalEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  12151. Process a single block using the basic ElGamal algorithm.
  12152. @param in the input array.
  12153. @param inOff the offset into the input buffer where the data starts.
  12154. @param length the length of the data to be processed.
  12155. @return the result of the ElGamal process.
  12156. @exception DataLengthException the input block is too large.
  12157. </member>
  12158. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Gost28147Engine">
  12159. implementation of GOST 28147-89
  12160. </member>
  12161. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Gost28147Engine.#ctor">
  12162. standard constructor.
  12163. </member>
  12164. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Gost28147Engine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12165. initialise an Gost28147 cipher.
  12166. @param forEncryption whether or not we are for encryption.
  12167. @param parameters the parameters required to set up the cipher.
  12168. @exception ArgumentException if the parameters argument is inappropriate.
  12169. </member>
  12170. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Gost28147Engine.GetSBox(System.String)">
  12171. Return the S-Box associated with SBoxName
  12172. @param sBoxName name of the S-Box
  12173. @return byte array representing the S-Box
  12174. </member>
  12175. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Grain128AeadEngine.STATE_SIZE">
  12176. Constants
  12177. </member>
  12178. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Grain128AeadEngine.workingKey">
  12179. Variables to hold the state of the engine during encryption and
  12180. decryption
  12181. </member>
  12182. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Grain128AeadEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12183. Initialize a Grain-128AEAD cipher.
  12184. @param forEncryption Whether or not we are for encryption.
  12185. @param param The parameters required to set up the cipher.
  12186. @throws ArgumentException If the params argument is inappropriate.
  12187. </member>
  12188. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Grain128AeadEngine.InitGrain">
  12189. 320 clocks initialization phase.
  12190. </member>
  12191. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Grain128AeadEngine.GetOutputNFSR">
  12192. Get output from non-linear function g(x).
  12193. @return Output from NFSR.
  12194. </member>
  12195. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Grain128AeadEngine.GetOutputLFSR">
  12196. Get output from linear function f(x).
  12197. @return Output from LFSR.
  12198. </member>
  12199. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Grain128AeadEngine.GetOutput">
  12200. Get output from output function h(x).
  12201. @return y_t.
  12202. </member>
  12203. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Grain128AeadEngine.Shift(System.UInt32[],System.UInt32)">
  12204. Shift array 1 bit and add val to index.Length - 1.
  12205. @param array The array to shift.
  12206. @param val The value to shift in.
  12207. @return The shifted array with val added to index.Length - 1.
  12208. </member>
  12209. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Grain128AeadEngine.SetKey(System.Byte[],System.Byte[])">
  12210. Set keys, reset cipher.
  12211. @param keyBytes The key.
  12212. @param ivBytes The IV.
  12213. </member>
  12214. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.HC128Engine">
  12215. HC-128 is a software-efficient stream cipher created by Hongjun Wu. It
  12216. generates keystream from a 128-bit secret key and a 128-bit initialization
  12217. vector.
  12218. <p>
  12219. http://www.ecrypt.eu.org/stream/p3ciphers/hc/hc128_p3.pdf
  12220. </p><p>
  12221. It is a third phase candidate in the eStream contest, and is patent-free.
  12222. No attacks are known as of today (April 2007). See
  12223. http://www.ecrypt.eu.org/stream/hcp3.html
  12224. </p>
  12225. </member>
  12226. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.HC128Engine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12227. Initialise a HC-128 cipher.
  12228. @param forEncryption whether or not we are for encryption. Irrelevant, as
  12229. encryption and decryption are the same.
  12230. @param params the parameters required to set up the cipher.
  12231. @throws ArgumentException if the params argument is
  12232. inappropriate (ie. the key is not 128 bit long).
  12233. </member>
  12234. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.HC256Engine">
  12235. HC-256 is a software-efficient stream cipher created by Hongjun Wu. It
  12236. generates keystream from a 256-bit secret key and a 256-bit initialization
  12237. vector.
  12238. <p>
  12239. http://www.ecrypt.eu.org/stream/p3ciphers/hc/hc256_p3.pdf
  12240. </p><p>
  12241. Its brother, HC-128, is a third phase candidate in the eStream contest.
  12242. The algorithm is patent-free. No attacks are known as of today (April 2007).
  12243. See
  12244. http://www.ecrypt.eu.org/stream/hcp3.html
  12245. </p>
  12246. </member>
  12247. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.HC256Engine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12248. Initialise a HC-256 cipher.
  12249. @param forEncryption whether or not we are for encryption. Irrelevant, as
  12250. encryption and decryption are the same.
  12251. @param params the parameters required to set up the cipher.
  12252. @throws ArgumentException if the params argument is
  12253. inappropriate (ie. the key is not 256 bit long).
  12254. </member>
  12255. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IdeaEngine">
  12256. A class that provides a basic International Data Encryption Algorithm (IDEA) engine.
  12257. <p>
  12258. This implementation is based on the "HOWTO: INTERNATIONAL DATA ENCRYPTION ALGORITHM"
  12259. implementation summary by Fauzan Mirza (F.U.Mirza@sheffield.ac.uk). (barring 1 typo at the
  12260. end of the MulInv function!).
  12261. </p>
  12262. <p>
  12263. It can be found at ftp://ftp.funet.fi/pub/crypt/cryptography/symmetric/idea/
  12264. </p>
  12265. <p>
  12266. Note: This algorithm was patented in the USA, Japan and Europe. These patents expired in 2011/2012.
  12267. </p>
  12268. </member>
  12269. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IdeaEngine.#ctor">
  12270. standard constructor.
  12271. </member>
  12272. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IdeaEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12273. initialise an IDEA cipher.
  12274. @param forEncryption whether or not we are for encryption.
  12275. @param parameters the parameters required to set up the cipher.
  12276. @exception ArgumentException if the parameters argument is
  12277. inappropriate.
  12278. </member>
  12279. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IdeaEngine.Mul(System.Int32,System.Int32)">
  12280. return x = x * y where the multiplication is done modulo
  12281. 65537 (0x10001) (as defined in the IDEA specification) and
  12282. a zero input is taken to be 65536 (0x10000).
  12283. @param x the x value
  12284. @param y the y value
  12285. @return x = x * y
  12286. </member>
  12287. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IdeaEngine.ExpandKey(System.Byte[])">
  12288. The following function is used to expand the user key to the encryption
  12289. subkey. The first 16 bytes are the user key, and the rest of the subkey
  12290. is calculated by rotating the previous 16 bytes by 25 bits to the left,
  12291. and so on until the subkey is completed.
  12292. </member>
  12293. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IdeaEngine.MulInv(System.Int32)">
  12294. This function computes multiplicative inverse using Euclid's Greatest
  12295. Common Divisor algorithm. Zero and one are self inverse.
  12296. <p>
  12297. i.e. x * MulInv(x) == 1 (modulo BASE)
  12298. </p>
  12299. </member>
  12300. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IdeaEngine.AddInv(System.Int32)">
  12301. Return the additive inverse of x.
  12302. <p>
  12303. i.e. x + AddInv(x) == 0
  12304. </p>
  12305. </member>
  12306. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IdeaEngine.InvertKey(System.Int32[])">
  12307. The function to invert the encryption subkey to the decryption subkey.
  12308. It also involves the multiplicative inverse and the additive inverse functions.
  12309. </member>
  12310. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IesEngine">
  12311. support class for constructing intergrated encryption ciphers
  12312. for doing basic message exchanges on top of key agreement ciphers
  12313. </member>
  12314. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IesEngine.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBasicAgreement,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDerivationFunction,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac)">
  12315. set up for use with stream mode, where the key derivation function
  12316. is used to provide a stream of bytes to xor with the message.
  12317. @param agree the key agreement used as the basis for the encryption
  12318. @param kdf the key derivation function used for byte generation
  12319. @param mac the message authentication code generator for the message
  12320. </member>
  12321. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IesEngine.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBasicAgreement,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDerivationFunction,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.BufferedBlockCipher)">
  12322. set up for use in conjunction with a block cipher to handle the
  12323. message.
  12324. @param agree the key agreement used as the basis for the encryption
  12325. @param kdf the key derivation function used for byte generation
  12326. @param mac the message authentication code generator for the message
  12327. @param cipher the cipher to used for encrypting the message
  12328. </member>
  12329. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IesEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12330. Initialise the encryptor.
  12331. @param forEncryption whether or not this is encryption/decryption.
  12332. @param privParam our private key parameters
  12333. @param pubParam the recipient's/sender's public key parameters
  12334. @param param encoding and derivation parameters.
  12335. </member>
  12336. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IsaacEngine">
  12337. Implementation of Bob Jenkin's ISAAC (Indirection Shift Accumulate Add and Count).
  12338. see: http://www.burtleburtle.net/bob/rand/isaacafa.html
  12339. </member>
  12340. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.IsaacEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12341. initialise an ISAAC cipher.
  12342. @param forEncryption whether or not we are for encryption.
  12343. @param params the parameters required to set up the cipher.
  12344. @exception ArgumentException if the params argument is
  12345. inappropriate.
  12346. </member>
  12347. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine">
  12348. NaccacheStern Engine. For details on this cipher, please see
  12349. http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf
  12350. </member>
  12351. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12352. Initializes this algorithm. Must be called before all other Functions.
  12353. @see org.bouncycastle.crypto.AsymmetricBlockCipher#init(bool,
  12354. org.bouncycastle.crypto.CipherParameters)
  12355. </member>
  12356. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.GetInputBlockSize">
  12357. Returns the input block size of this algorithm.
  12358. @see org.bouncycastle.crypto.AsymmetricBlockCipher#GetInputBlockSize()
  12359. </member>
  12360. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.GetOutputBlockSize">
  12361. Returns the output block size of this algorithm.
  12362. @see org.bouncycastle.crypto.AsymmetricBlockCipher#GetOutputBlockSize()
  12363. </member>
  12364. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  12365. Process a single Block using the Naccache-Stern algorithm.
  12366. @see org.bouncycastle.crypto.AsymmetricBlockCipher#ProcessBlock(byte[],
  12367. int, int)
  12368. </member>
  12369. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.Encrypt(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  12370. Encrypts a BigInteger aka Plaintext with the public key.
  12371. @param plain
  12372. The BigInteger to encrypt
  12373. @return The byte[] representation of the encrypted BigInteger (i.e.
  12374. crypted.toByteArray())
  12375. </member>
  12376. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.AddCryptedBlocks(System.Byte[],System.Byte[])">
  12377. Adds the contents of two encrypted blocks mod sigma
  12378. @param block1
  12379. the first encrypted block
  12380. @param block2
  12381. the second encrypted block
  12382. @return encrypt((block1 + block2) mod sigma)
  12383. @throws InvalidCipherTextException
  12384. </member>
  12385. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.ProcessData(System.Byte[])">
  12386. Convenience Method for data exchange with the cipher.
  12387. Determines blocksize and splits data to blocksize.
  12388. @param data the data to be processed
  12389. @return the data after it went through the NaccacheSternEngine.
  12390. @throws InvalidCipherTextException
  12391. </member>
  12392. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.ChineseRemainder(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger})">
  12393. Computes the integer x that is expressed through the given primes and the
  12394. congruences with the chinese remainder theorem (CRT).
  12395. @param congruences
  12396. the congruences c_i
  12397. @param primes
  12398. the primes p_i
  12399. @return an integer x for that x % p_i == c_i
  12400. </member>
  12401. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NoekeonEngine">
  12402. A Noekeon engine, using direct-key mode.
  12403. </member>
  12404. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NoekeonEngine.#ctor">
  12405. Create an instance of the Noekeon encryption algorithm
  12406. and set some defaults
  12407. </member>
  12408. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.NoekeonEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12409. initialise
  12410. @param forEncryption whether or not we are for encryption.
  12411. @param params the parameters required to set up the cipher.
  12412. @exception ArgumentException if the params argument is
  12413. inappropriate.
  12414. </member>
  12415. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2Engine">
  12416. an implementation of RC2 as described in RFC 2268
  12417. "A Description of the RC2(r) Encryption Algorithm" R. Rivest.
  12418. </member>
  12419. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2Engine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12420. initialise a RC2 cipher.
  12421. @param forEncryption whether or not we are for encryption.
  12422. @param parameters the parameters required to set up the cipher.
  12423. @exception ArgumentException if the parameters argument is
  12424. inappropriate.
  12425. </member>
  12426. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2Engine.RotateWordLeft(System.Int32,System.Int32)">
  12427. return the result rotating the 16 bit number in x left by y
  12428. </member>
  12429. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine">
  12430. Wrap keys according to RFC 3217 - RC2 mechanism
  12431. </member>
  12432. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.engine">
  12433. Field engine
  12434. </member>
  12435. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.parameters">
  12436. Field param
  12437. </member>
  12438. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.paramPlusIV">
  12439. Field paramPlusIV
  12440. </member>
  12441. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.iv">
  12442. Field iv
  12443. </member>
  12444. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.forWrapping">
  12445. Field forWrapping
  12446. </member>
  12447. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.IV2">
  12448. Field IV2
  12449. </member>
  12450. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12451. Method init
  12452. @param forWrapping
  12453. @param param
  12454. </member>
  12455. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.AlgorithmName">
  12456. Method GetAlgorithmName
  12457. @return
  12458. </member>
  12459. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.Wrap(System.Byte[],System.Int32,System.Int32)">
  12460. Method wrap
  12461. @param in
  12462. @param inOff
  12463. @param inLen
  12464. @return
  12465. </member>
  12466. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.Unwrap(System.Byte[],System.Int32,System.Int32)">
  12467. Method unwrap
  12468. @param in
  12469. @param inOff
  12470. @param inLen
  12471. @return
  12472. @throws InvalidCipherTextException
  12473. </member>
  12474. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.CalculateCmsKeyChecksum(System.Byte[])">
  12475. Some key wrap algorithms make use of the Key Checksum defined
  12476. in CMS [CMS-Algorithms]. This is used to provide an integrity
  12477. check value for the key being wrapped. The algorithm is
  12478. - Compute the 20 octet SHA-1 hash on the key being wrapped.
  12479. - Use the first 8 octets of this hash as the checksum value.
  12480. @param key
  12481. @return
  12482. @throws Exception
  12483. @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum
  12484. </member>
  12485. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.CheckCmsKeyChecksum(System.Byte[],System.Byte[])">
  12486. @param key
  12487. @param checksum
  12488. @return
  12489. @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum
  12490. </member>
  12491. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC4Engine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12492. initialise a RC4 cipher.
  12493. @param forEncryption whether or not we are for encryption.
  12494. @param parameters the parameters required to set up the cipher.
  12495. @exception ArgumentException if the parameters argument is
  12496. inappropriate.
  12497. </member>
  12498. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC532Engine">
  12499. The specification for RC5 came from the <code>RC5 Encryption Algorithm</code>
  12500. publication in RSA CryptoBytes, Spring of 1995.
  12501. <em>http://www.rsasecurity.com/rsalabs/cryptobytes</em>.
  12502. <p>
  12503. This implementation has a word size of 32 bits.</p>
  12504. </member>
  12505. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC532Engine.#ctor">
  12506. Create an instance of the RC5 encryption algorithm
  12507. and set some defaults
  12508. </member>
  12509. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC532Engine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12510. initialise a RC5-32 cipher.
  12511. @param forEncryption whether or not we are for encryption.
  12512. @param parameters the parameters required to set up the cipher.
  12513. @exception ArgumentException if the parameters argument is
  12514. inappropriate.
  12515. </member>
  12516. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC532Engine.SetKey(System.Byte[])">
  12517. Re-key the cipher.
  12518. @param key the key to be used
  12519. </member>
  12520. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC564Engine">
  12521. The specification for RC5 came from the <code>RC5 Encryption Algorithm</code>
  12522. publication in RSA CryptoBytes, Spring of 1995.
  12523. <em>http://www.rsasecurity.com/rsalabs/cryptobytes</em>.
  12524. <p>
  12525. This implementation is set to work with a 64 bit word size.</p>
  12526. </member>
  12527. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC564Engine.#ctor">
  12528. Create an instance of the RC5 encryption algorithm
  12529. and set some defaults
  12530. </member>
  12531. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC564Engine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12532. initialise a RC5-64 cipher.
  12533. @param forEncryption whether or not we are for encryption.
  12534. @param parameters the parameters required to set up the cipher.
  12535. @exception ArgumentException if the parameters argument is
  12536. inappropriate.
  12537. </member>
  12538. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC564Engine.SetKey(System.Byte[])">
  12539. Re-key the cipher.
  12540. @param key the key to be used
  12541. </member>
  12542. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC6Engine">
  12543. An RC6 engine.
  12544. </member>
  12545. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC6Engine.#ctor">
  12546. Create an instance of the RC6 encryption algorithm
  12547. and set some defaults
  12548. </member>
  12549. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC6Engine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12550. initialise a RC5-32 cipher.
  12551. @param forEncryption whether or not we are for encryption.
  12552. @param parameters the parameters required to set up the cipher.
  12553. @exception ArgumentException if the parameters argument is
  12554. inappropriate.
  12555. </member>
  12556. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RC6Engine.SetKey(System.Byte[])">
  12557. Re-key the cipher.
  12558. @param inKey the key to be used
  12559. </member>
  12560. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Rfc3211WrapEngine">
  12561. an implementation of the RFC 3211 Key Wrap
  12562. Specification.
  12563. </member>
  12564. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Rfc3394WrapEngine">
  12565. <remarks>
  12566. An implementation of the AES Key Wrapper from the NIST Key Wrap
  12567. Specification as described in RFC 3394.
  12568. <p/>
  12569. For further details see: <a href="http://www.ietf.org/rfc/rfc3394.txt">http://www.ietf.org/rfc/rfc3394.txt</a>
  12570. and <a href="http://csrc.nist.gov/encryption/kms/key-wrap.pdf">http://csrc.nist.gov/encryption/kms/key-wrap.pdf</a>.
  12571. </remarks>
  12572. </member>
  12573. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RijndaelEngine">
  12574. an implementation of Rijndael, based on the documentation and reference implementation
  12575. by Paulo Barreto, Vincent Rijmen, for v2.0 August '99.
  12576. <p>
  12577. Note: this implementation is based on information prior to readonly NIST publication.
  12578. </p>
  12579. </member>
  12580. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RijndaelEngine.Mul0x2(System.Int32)">
  12581. multiply two elements of GF(2^m)
  12582. needed for MixColumn and InvMixColumn
  12583. </member>
  12584. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RijndaelEngine.KeyAddition(System.Int64[])">
  12585. xor corresponding text input and round key input bytes
  12586. </member>
  12587. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RijndaelEngine.ShiftRow(System.Byte[])">
  12588. Row 0 remains unchanged
  12589. The other three rows are shifted a variable amount
  12590. </member>
  12591. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RijndaelEngine.Substitution(System.Byte[])">
  12592. Replace every byte of the input by the byte at that place
  12593. in the nonlinear S-box
  12594. </member>
  12595. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RijndaelEngine.MixColumn">
  12596. Mix the bytes of every column in a linear way
  12597. </member>
  12598. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RijndaelEngine.InvMixColumn">
  12599. Mix the bytes of every column in a linear way
  12600. This is the opposite operation of Mixcolumn
  12601. </member>
  12602. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RijndaelEngine.GenerateWorkingKey(System.Byte[])">
  12603. Calculate the necessary round keys
  12604. The number of calculations depends on keyBits and blockBits
  12605. </member>
  12606. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RijndaelEngine.#ctor">
  12607. default constructor - 128 bit block size.
  12608. </member>
  12609. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RijndaelEngine.#ctor(System.Int32)">
  12610. basic constructor - set the cipher up for a given blocksize
  12611. @param blocksize the blocksize in bits, must be 128, 192, or 256.
  12612. </member>
  12613. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RijndaelEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12614. initialise a Rijndael cipher.
  12615. @param forEncryption whether or not we are for encryption.
  12616. @param parameters the parameters required to set up the cipher.
  12617. @exception ArgumentException if the parameters argument is
  12618. inappropriate.
  12619. </member>
  12620. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaBlindedEngine">
  12621. this does your basic RSA algorithm with blinding
  12622. </member>
  12623. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaBlindedEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12624. initialise the RSA engine.
  12625. @param forEncryption true if we are encrypting, false otherwise.
  12626. @param param the necessary RSA key parameters.
  12627. </member>
  12628. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaBlindedEngine.GetInputBlockSize">
  12629. Return the maximum size for an input block to this engine.
  12630. For RSA this is always one byte less than the key size on
  12631. encryption, and the same length as the key size on decryption.
  12632. @return maximum size for an input block.
  12633. </member>
  12634. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaBlindedEngine.GetOutputBlockSize">
  12635. Return the maximum size for an output block to this engine.
  12636. For RSA this is always one byte less than the key size on
  12637. decryption, and the same length as the key size on encryption.
  12638. @return maximum size for an output block.
  12639. </member>
  12640. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaBlindedEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  12641. Process a single block using the basic RSA algorithm.
  12642. @param inBuf the input array.
  12643. @param inOff the offset into the input buffer where the data starts.
  12644. @param inLen the length of the data to be processed.
  12645. @return the result of the RSA process.
  12646. @exception DataLengthException the input block is too large.
  12647. </member>
  12648. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaBlindingEngine">
  12649. This does your basic RSA Chaum's blinding and unblinding as outlined in
  12650. "Handbook of Applied Cryptography", page 475. You need to use this if you are
  12651. trying to get another party to generate signatures without them being aware
  12652. of the message they are signing.
  12653. </member>
  12654. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaBlindingEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12655. Initialise the blinding engine.
  12656. @param forEncryption true if we are encrypting (blinding), false otherwise.
  12657. @param param the necessary RSA key parameters.
  12658. </member>
  12659. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaBlindingEngine.GetInputBlockSize">
  12660. Return the maximum size for an input block to this engine.
  12661. For RSA this is always one byte less than the key size on
  12662. encryption, and the same length as the key size on decryption.
  12663. @return maximum size for an input block.
  12664. </member>
  12665. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaBlindingEngine.GetOutputBlockSize">
  12666. Return the maximum size for an output block to this engine.
  12667. For RSA this is always one byte less than the key size on
  12668. decryption, and the same length as the key size on encryption.
  12669. @return maximum size for an output block.
  12670. </member>
  12671. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaBlindingEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  12672. Process a single block using the RSA blinding algorithm.
  12673. @param in the input array.
  12674. @param inOff the offset into the input buffer where the data starts.
  12675. @param inLen the length of the data to be processed.
  12676. @return the result of the RSA process.
  12677. @throws DataLengthException the input block is too large.
  12678. </member>
  12679. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaCoreEngine">
  12680. this does your basic RSA algorithm.
  12681. </member>
  12682. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaCoreEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12683. initialise the RSA engine.
  12684. @param forEncryption true if we are encrypting, false otherwise.
  12685. @param param the necessary RSA key parameters.
  12686. </member>
  12687. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaCoreEngine.GetInputBlockSize">
  12688. Return the maximum size for an input block to this engine.
  12689. For RSA this is always one byte less than the key size on
  12690. encryption, and the same length as the key size on decryption.
  12691. @return maximum size for an input block.
  12692. </member>
  12693. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaCoreEngine.GetOutputBlockSize">
  12694. Return the maximum size for an output block to this engine.
  12695. For RSA this is always one byte less than the key size on
  12696. decryption, and the same length as the key size on encryption.
  12697. @return maximum size for an output block.
  12698. </member>
  12699. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaEngine">
  12700. this does your basic RSA algorithm.
  12701. </member>
  12702. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12703. initialise the RSA engine.
  12704. @param forEncryption true if we are encrypting, false otherwise.
  12705. @param param the necessary RSA key parameters.
  12706. </member>
  12707. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaEngine.GetInputBlockSize">
  12708. Return the maximum size for an input block to this engine.
  12709. For RSA this is always one byte less than the key size on
  12710. encryption, and the same length as the key size on decryption.
  12711. @return maximum size for an input block.
  12712. </member>
  12713. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaEngine.GetOutputBlockSize">
  12714. Return the maximum size for an output block to this engine.
  12715. For RSA this is always one byte less than the key size on
  12716. decryption, and the same length as the key size on encryption.
  12717. @return maximum size for an output block.
  12718. </member>
  12719. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.RsaEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  12720. Process a single block using the basic RSA algorithm.
  12721. @param inBuf the input array.
  12722. @param inOff the offset into the input buffer where the data starts.
  12723. @param inLen the length of the data to be processed.
  12724. @return the result of the RSA process.
  12725. @exception DataLengthException the input block is too large.
  12726. </member>
  12727. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Salsa20Engine">
  12728. <summary>
  12729. Implementation of Daniel J. Bernstein's Salsa20 stream cipher, Snuffle 2005
  12730. </summary>
  12731. </member>
  12732. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Salsa20Engine.StateSize">
  12733. Constants
  12734. </member>
  12735. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Salsa20Engine.#ctor">
  12736. <summary>
  12737. Creates a 20 round Salsa20 engine.
  12738. </summary>
  12739. </member>
  12740. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.Salsa20Engine.#ctor(System.Int32)">
  12741. <summary>
  12742. Creates a Salsa20 engine with a specific number of rounds.
  12743. </summary>
  12744. <param name="rounds">the number of rounds (must be an even number).</param>
  12745. </member>
  12746. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SeedEngine">
  12747. Implementation of the SEED algorithm as described in RFC 4009
  12748. </member>
  12749. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SeedWrapEngine">
  12750. <remarks>
  12751. An implementation of the SEED key wrapper based on RFC 4010/RFC 3394.
  12752. <p/>
  12753. For further details see: <a href="http://www.ietf.org/rfc/rfc4010.txt">http://www.ietf.org/rfc/rfc4010.txt</a>.
  12754. </remarks>
  12755. </member>
  12756. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngine">
  12757. * Serpent is a 128-bit 32-round block cipher with variable key lengths,
  12758. * including 128, 192 and 256 bit keys conjectured to be at least as
  12759. * secure as three-key triple-DES.
  12760. * <p>
  12761. * Serpent was designed by Ross Anderson, Eli Biham and Lars Knudsen as a
  12762. * candidate algorithm for the NIST AES Quest.
  12763. * </p>
  12764. * <p>
  12765. * For full details see <a href="http://www.cl.cam.ac.uk/~rja14/serpent.html">The Serpent home page</a>
  12766. * </p>
  12767. </member>
  12768. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngine.MakeWorkingKey(System.Byte[])">
  12769. Expand a user-supplied key material into a session key.
  12770. @param key The user-key bytes (multiples of 4) to use.
  12771. @exception ArgumentException
  12772. </member>
  12773. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12774. initialise a Serpent cipher.
  12775. @param encrypting whether or not we are for encryption.
  12776. @param params the parameters required to set up the cipher.
  12777. @throws IllegalArgumentException if the params argument is
  12778. inappropriate.
  12779. </member>
  12780. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  12781. Process one block of input from the array in and write it to
  12782. the out array.
  12783. @param in the array containing the input data.
  12784. @param inOff offset into the in array the data starts at.
  12785. @param out the array the output data will be copied into.
  12786. @param outOff the offset into the out array the output will start at.
  12787. @return the number of bytes processed and produced.
  12788. @throws DataLengthException if there isn't enough data in in, or
  12789. space in out.
  12790. @throws IllegalStateException if the cipher isn't initialised.
  12791. </member>
  12792. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib0(System.Int32,System.Int32,System.Int32,System.Int32)">
  12793. InvSO - {13, 3,11, 0,10, 6, 5,12, 1,14, 4, 7,15, 9, 8, 2 } - 15 terms.
  12794. </member>
  12795. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb1(System.Int32,System.Int32,System.Int32,System.Int32)">
  12796. S1 - {15,12, 2, 7, 9, 0, 5,10, 1,11,14, 8, 6,13, 3, 4 } - 14 terms.
  12797. </member>
  12798. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib1(System.Int32,System.Int32,System.Int32,System.Int32)">
  12799. InvS1 - { 5, 8, 2,14,15, 6,12, 3,11, 4, 7, 9, 1,13,10, 0 } - 14 steps.
  12800. </member>
  12801. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb2(System.Int32,System.Int32,System.Int32,System.Int32)">
  12802. S2 - { 8, 6, 7, 9, 3,12,10,15,13, 1,14, 4, 0,11, 5, 2 } - 16 terms.
  12803. </member>
  12804. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib2(System.Int32,System.Int32,System.Int32,System.Int32)">
  12805. InvS2 - {12, 9,15, 4,11,14, 1, 2, 0, 3, 6,13, 5, 8,10, 7 } - 16 steps.
  12806. </member>
  12807. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb3(System.Int32,System.Int32,System.Int32,System.Int32)">
  12808. S3 - { 0,15,11, 8,12, 9, 6, 3,13, 1, 2, 4,10, 7, 5,14 } - 16 terms.
  12809. </member>
  12810. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib3(System.Int32,System.Int32,System.Int32,System.Int32)">
  12811. InvS3 - { 0, 9,10, 7,11,14, 6,13, 3, 5,12, 2, 4, 8,15, 1 } - 15 terms
  12812. </member>
  12813. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb4(System.Int32,System.Int32,System.Int32,System.Int32)">
  12814. S4 - { 1,15, 8, 3,12, 0,11, 6, 2, 5, 4,10, 9,14, 7,13 } - 15 terms.
  12815. </member>
  12816. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib4(System.Int32,System.Int32,System.Int32,System.Int32)">
  12817. InvS4 - { 5, 0, 8, 3,10, 9, 7,14, 2,12,11, 6, 4,15,13, 1 } - 15 terms.
  12818. </member>
  12819. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb5(System.Int32,System.Int32,System.Int32,System.Int32)">
  12820. S5 - {15, 5, 2,11, 4,10, 9,12, 0, 3,14, 8,13, 6, 7, 1 } - 16 terms.
  12821. </member>
  12822. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib5(System.Int32,System.Int32,System.Int32,System.Int32)">
  12823. InvS5 - { 8,15, 2, 9, 4, 1,13,14,11, 6, 5, 3, 7,12,10, 0 } - 16 terms.
  12824. </member>
  12825. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb6(System.Int32,System.Int32,System.Int32,System.Int32)">
  12826. S6 - { 7, 2,12, 5, 8, 4, 6,11,14, 9, 1,15,13, 3,10, 0 } - 15 terms.
  12827. </member>
  12828. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib6(System.Int32,System.Int32,System.Int32,System.Int32)">
  12829. InvS6 - {15,10, 1,13, 5, 3, 6, 0, 4, 9,14, 7, 2,12, 8,11 } - 15 terms.
  12830. </member>
  12831. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb7(System.Int32,System.Int32,System.Int32,System.Int32)">
  12832. S7 - { 1,13,15, 0,14, 8, 2,11, 7, 4,12,10, 9, 3, 5, 6 } - 16 terms.
  12833. </member>
  12834. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib7(System.Int32,System.Int32,System.Int32,System.Int32)">
  12835. InvS7 - { 3, 0, 6,13, 9,14,15, 8, 5,12,11, 7,10, 1, 4, 2 } - 17 terms.
  12836. </member>
  12837. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.LT">
  12838. Apply the linear transformation to the register set.
  12839. </member>
  12840. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.InverseLT">
  12841. Apply the inverse of the linear transformation to the register set.
  12842. </member>
  12843. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SkipjackEngine">
  12844. a class that provides a basic SKIPJACK engine.
  12845. </member>
  12846. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SkipjackEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12847. initialise a SKIPJACK cipher.
  12848. @param forEncryption whether or not we are for encryption.
  12849. @param parameters the parameters required to set up the cipher.
  12850. @exception ArgumentException if the parameters argument is
  12851. inappropriate.
  12852. </member>
  12853. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SkipjackEngine.G(System.Int32,System.Int32)">
  12854. The G permutation
  12855. </member>
  12856. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SkipjackEngine.H(System.Int32,System.Int32)">
  12857. the inverse of the G permutation.
  12858. </member>
  12859. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SM2Engine">
  12860. <summary>
  12861. SM2 public key encryption engine - based on https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02.
  12862. </summary>
  12863. </member>
  12864. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.SM4Engine">
  12865. <summary>SM4 Block Cipher - SM4 is a 128 bit block cipher with a 128 bit key.</summary>
  12866. <remarks>
  12867. The implementation here is based on the document <a href="http://eprint.iacr.org/2008/329.pdf">http://eprint.iacr.org/2008/329.pdf</a>
  12868. by Whitfield Diffie and George Ledin, which is a translation of Prof. LU Shu-wang's original standard.
  12869. </remarks>
  12870. </member>
  12871. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TeaEngine">
  12872. An TEA engine.
  12873. </member>
  12874. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TeaEngine.#ctor">
  12875. Create an instance of the TEA encryption algorithm
  12876. and set some defaults
  12877. </member>
  12878. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TeaEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12879. initialise
  12880. @param forEncryption whether or not we are for encryption.
  12881. @param params the parameters required to set up the cipher.
  12882. @exception ArgumentException if the params argument is
  12883. inappropriate.
  12884. </member>
  12885. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TeaEngine.SetKey(System.Byte[])">
  12886. Re-key the cipher.
  12887. @param key the key to be used
  12888. </member>
  12889. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine">
  12890. <summary>
  12891. Implementation of the Threefish tweakable large block cipher in 256, 512 and 1024 bit block
  12892. sizes.
  12893. </summary>
  12894. <remarks>
  12895. This is the 1.3 version of Threefish defined in the Skein hash function submission to the NIST
  12896. SHA-3 competition in October 2010.
  12897. <p/>
  12898. Threefish was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir
  12899. Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker.
  12900. <p/>
  12901. This implementation inlines all round functions, unrolls 8 rounds, and uses 1.2k of static tables
  12902. to speed up key schedule injection. <br/>
  12903. 2 x block size state is retained by each cipher instance.
  12904. </remarks>
  12905. </member>
  12906. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_256">
  12907. <summary>
  12908. 256 bit block size - Threefish-256
  12909. </summary>
  12910. </member>
  12911. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_512">
  12912. <summary>
  12913. 512 bit block size - Threefish-512
  12914. </summary>
  12915. </member>
  12916. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_1024">
  12917. <summary>
  12918. 1024 bit block size - Threefish-1024
  12919. </summary>
  12920. </member>
  12921. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.TWEAK_SIZE_BYTES">
  12922. Size of the tweak in bytes (always 128 bit/16 bytes)
  12923. </member>
  12924. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ROUNDS_256">
  12925. Rounds in Threefish-256
  12926. </member>
  12927. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ROUNDS_512">
  12928. Rounds in Threefish-512
  12929. </member>
  12930. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ROUNDS_1024">
  12931. Rounds in Threefish-1024
  12932. </member>
  12933. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.MAX_ROUNDS">
  12934. Max rounds of any of the variants
  12935. </member>
  12936. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.C_240">
  12937. Key schedule parity constant
  12938. </member>
  12939. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.blocksizeBytes">
  12940. Block size in bytes
  12941. </member>
  12942. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.blocksizeWords">
  12943. Block size in 64 bit words
  12944. </member>
  12945. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.currentBlock">
  12946. Buffer for byte oriented processBytes to call internal word API
  12947. </member>
  12948. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.t">
  12949. Tweak bytes (2 byte t1,t2, calculated t3 and repeat of t1,t2 for modulo free lookup
  12950. </member>
  12951. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.kw">
  12952. Key schedule words
  12953. </member>
  12954. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.cipher">
  12955. The internal cipher implementation (varies by blocksize)
  12956. </member>
  12957. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.#ctor(System.Int32)">
  12958. <summary>
  12959. Constructs a new Threefish cipher, with a specified block size.
  12960. </summary>
  12961. <param name="blocksizeBits">the block size in bits, one of <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_256"/>, <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_512"/>,
  12962. <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_1024"/> .</param>
  12963. </member>
  12964. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  12965. <summary>
  12966. Initialise the engine.
  12967. </summary>
  12968. <param name="forEncryption">Initialise for encryption if true, for decryption if false.</param>
  12969. <param name="parameters">an instance of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.TweakableBlockCipherParameters"/> or <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KeyParameter"/> (to
  12970. use a 0 tweak)</param>
  12971. </member>
  12972. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Init(System.Boolean,System.UInt64[],System.UInt64[])">
  12973. <summary>
  12974. Initialise the engine, specifying the key and tweak directly.
  12975. </summary>
  12976. <param name="forEncryption">the cipher mode.</param>
  12977. <param name="key">the words of the key, or <code>null</code> to use the current key.</param>
  12978. <param name="tweak">the 2 word (128 bit) tweak, or <code>null</code> to use the current tweak.</param>
  12979. </member>
  12980. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ProcessBlock(System.UInt64[],System.UInt64[])">
  12981. <summary>
  12982. Process a block of data represented as 64 bit words.
  12983. </summary>
  12984. <returns>the number of 8 byte words processed (which will be the same as the block size).</returns>
  12985. <param name="inWords">a block sized buffer of words to process.</param>
  12986. <param name="outWords">a block sized buffer of words to receive the output of the operation.</param>
  12987. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.DataLengthException">if either the input or output is not block sized</exception>
  12988. <exception cref="T:System.InvalidOperationException">if this engine is not initialised</exception>
  12989. </member>
  12990. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.RotlXor(System.UInt64,System.Int32,System.UInt64)">
  12991. Rotate left + xor part of the mix operation.
  12992. </member>
  12993. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.XorRotr(System.UInt64,System.Int32,System.UInt64)">
  12994. Rotate xor + rotate right part of the unmix operation.
  12995. </member>
  12996. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ThreefishCipher.t">
  12997. The extended + repeated tweak words
  12998. </member>
  12999. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ThreefishCipher.kw">
  13000. The extended + repeated key words
  13001. </member>
  13002. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish256Cipher.ROTATION_0_0">
  13003. Mix rotation constants defined in Skein 1.3 specification
  13004. </member>
  13005. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish256Cipher.ROTATION_0_1">
  13006. Mix rotation constants defined in Skein 1.3 specification
  13007. </member>
  13008. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish512Cipher.ROTATION_0_0">
  13009. Mix rotation constants defined in Skein 1.3 specification
  13010. </member>
  13011. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish512Cipher.ROTATION_0_1">
  13012. Mix rotation constants defined in Skein 1.3 specification
  13013. </member>
  13014. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish512Cipher.ROTATION_0_2">
  13015. Mix rotation constants defined in Skein 1.3 specification
  13016. </member>
  13017. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish512Cipher.ROTATION_0_3">
  13018. Mix rotation constants defined in Skein 1.3 specification
  13019. </member>
  13020. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish1024Cipher.ROTATION_0_0">
  13021. Mix rotation constants defined in Skein 1.3 specification
  13022. </member>
  13023. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish1024Cipher.ROTATION_0_1">
  13024. Mix rotation constants defined in Skein 1.3 specification
  13025. </member>
  13026. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish1024Cipher.ROTATION_0_2">
  13027. Mix rotation constants defined in Skein 1.3 specification
  13028. </member>
  13029. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish1024Cipher.ROTATION_0_3">
  13030. Mix rotation constants defined in Skein 1.3 specification
  13031. </member>
  13032. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TnepresEngine">
  13033. Tnepres is a 128-bit 32-round block cipher with variable key lengths,
  13034. including 128, 192 and 256 bit keys conjectured to be at least as
  13035. secure as three-key triple-DES.
  13036. <p>
  13037. Tnepres is based on Serpent which was designed by Ross Anderson, Eli Biham and Lars Knudsen as a
  13038. candidate algorithm for the NIST AES Quest. Unfortunately there was an endianness issue
  13039. with test vectors in the AES submission and the resulting confusion lead to the Tnepres cipher
  13040. as well, which is a byte swapped version of Serpent.
  13041. </p>
  13042. <p>
  13043. For full details see <a href="http://www.cl.cam.ac.uk/~rja14/serpent.html">The Serpent home page</a>
  13044. </p>
  13045. </member>
  13046. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TnepresEngine.MakeWorkingKey(System.Byte[])">
  13047. Expand a user-supplied key material into a session key.
  13048. @param key The user-key bytes (multiples of 4) to use.
  13049. @exception ArgumentException
  13050. </member>
  13051. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TwofishEngine">
  13052. A class that provides Twofish encryption operations.
  13053. This Java implementation is based on the Java reference
  13054. implementation provided by Bruce Schneier and developed
  13055. by Raif S. Naffah.
  13056. </member>
  13057. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TwofishEngine.P_00">
  13058. Define the fixed p0/p1 permutations used in keyed S-box lookup.
  13059. By changing the following constant definitions, the S-boxes will
  13060. automatically Get changed in the Twofish engine.
  13061. </member>
  13062. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TwofishEngine.gSubKeys">
  13063. gSubKeys[] and gSBox[] are eventually used in the
  13064. encryption and decryption methods.
  13065. </member>
  13066. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TwofishEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  13067. initialise a Twofish cipher.
  13068. @param forEncryption whether or not we are for encryption.
  13069. @param parameters the parameters required to set up the cipher.
  13070. @exception ArgumentException if the parameters argument is
  13071. inappropriate.
  13072. </member>
  13073. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TwofishEngine.EncryptBlock(System.ReadOnlySpan{System.Byte},System.Span{System.Byte})">
  13074. Encrypt the given input starting at the given offset and place
  13075. the result in the provided buffer starting at the given offset.
  13076. The input will be an exact multiple of our blocksize.
  13077. encryptBlock uses the pre-calculated gSBox[] and subKey[]
  13078. arrays.
  13079. </member>
  13080. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TwofishEngine.DecryptBlock(System.ReadOnlySpan{System.Byte},System.Span{System.Byte})">
  13081. Decrypt the given input starting at the given offset and place
  13082. the result in the provided buffer starting at the given offset.
  13083. The input will be an exact multiple of our blocksize.
  13084. </member>
  13085. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TwofishEngine.RS_MDS_Encode(System.Int32,System.Int32)">
  13086. Use (12, 8) Reed-Solomon code over GF(256) to produce
  13087. a key S-box 32-bit entity from 2 key material 32-bit
  13088. entities.
  13089. @param k0 first 32-bit entity
  13090. @param k1 second 32-bit entity
  13091. @return Remainder polynomial Generated using RS code
  13092. </member>
  13093. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.TwofishEngine.RS_rem(System.Int32)">
  13094. * Reed-Solomon code parameters: (12,8) reversible code:
  13095. * <p>
  13096. * <pre>
  13097. * G(x) = x^4 + (a+1/a)x^3 + ax^2 + (a+1/a)x + 1
  13098. * </pre>
  13099. * where a = primitive root of field generator 0x14D
  13100. * </p>
  13101. </member>
  13102. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.VmpcEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  13103. initialise a VMPC cipher.
  13104. @param forEncryption
  13105. whether or not we are for encryption.
  13106. @param params
  13107. the parameters required to set up the cipher.
  13108. @exception ArgumentException
  13109. if the params argument is inappropriate.
  13110. </member>
  13111. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.XSalsa20Engine">
  13112. <summary>
  13113. Implementation of Daniel J. Bernstein's XSalsa20 stream cipher - Salsa20 with an extended nonce.
  13114. </summary>
  13115. <remarks>
  13116. XSalsa20 requires a 256 bit key, and a 192 bit nonce.
  13117. </remarks>
  13118. </member>
  13119. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.XSalsa20Engine.SetKey(System.Byte[],System.Byte[])">
  13120. <summary>
  13121. XSalsa20 key generation: process 256 bit input key and 128 bits of the input nonce
  13122. using a core Salsa20 function without input addition to produce 256 bit working key
  13123. and use that with the remaining 64 bits of nonce to initialize a standard Salsa20 engine state.
  13124. </summary>
  13125. </member>
  13126. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.XteaEngine">
  13127. An XTEA engine.
  13128. </member>
  13129. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.XteaEngine.#ctor">
  13130. Create an instance of the TEA encryption algorithm
  13131. and set some defaults
  13132. </member>
  13133. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.XteaEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  13134. initialise
  13135. @param forEncryption whether or not we are for encryption.
  13136. @param params the parameters required to set up the cipher.
  13137. @exception ArgumentException if the params argument is
  13138. inappropriate.
  13139. </member>
  13140. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.XteaEngine.setKey(System.Byte[])">
  13141. Re-key the cipher.
  13142. @param key the key to be used
  13143. </member>
  13144. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Fpe.FpeEngine">
  13145. <summary>Base class for format-preserving encryption.</summary>
  13146. </member>
  13147. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Fpe.FpeEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  13148. <summary>
  13149. Process length bytes from inBuf, writing the output to outBuf.
  13150. </summary>
  13151. <returns>number of bytes output.</returns>
  13152. <param name="inBuf">input data.</param>
  13153. <param name="inOff">offset in input data to start at.</param>
  13154. <param name="length">number of bytes to process.</param>
  13155. <param name="outBuf">destination buffer.</param>
  13156. <param name="outOff">offset to start writing at in destination buffer.</param>
  13157. </member>
  13158. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Fpe.FpeEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  13159. <summary>
  13160. Initialize the FPE engine for encryption/decryption.
  13161. </summary>
  13162. <returns>number of bytes output.</returns>
  13163. <param name="forEncryption">true if initialising for encryption, false otherwise.</param>
  13164. <param name="parameters ">the key and other parameters to use to set the engine up.</param>
  13165. </member>
  13166. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BaseKdfBytesGenerator">
  13167. Basic KDF generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033
  13168. <br/>
  13169. This implementation is based on ISO 18033/P1363a.
  13170. </member>
  13171. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BaseKdfBytesGenerator.#ctor(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  13172. Construct a KDF Parameters generator.
  13173. @param counterStart value of counter.
  13174. @param digest the digest to be used as the source of derived keys.
  13175. </member>
  13176. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BaseKdfBytesGenerator.Digest">
  13177. return the underlying digest.
  13178. </member>
  13179. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BaseKdfBytesGenerator.GenerateBytes(System.Byte[],System.Int32,System.Int32)">
  13180. fill len bytes of the output buffer with bytes generated from
  13181. the derivation function.
  13182. @throws ArgumentException if the size of the request will cause an overflow.
  13183. @throws DataLengthException if the out buffer is too small.
  13184. </member>
  13185. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BCrypt">
  13186. Core of password hashing scheme Bcrypt,
  13187. designed by Niels Provos and David Mazières,
  13188. corresponds to the C reference implementation.
  13189. <p>
  13190. This implementation does not correspondent to the 1999 published paper
  13191. "A Future-Adaptable Password Scheme" of Niels Provos and David Mazières,
  13192. see: https://www.usenix.org/legacy/events/usenix99/provos/provos_html/node1.html.
  13193. In contrast to the paper, the order of key setup and salt setup is reversed:
  13194. state &lt;- ExpandKey(state, 0, key)
  13195. state %lt;- ExpandKey(state, 0, salt)
  13196. This corresponds to the OpenBSD reference implementation of Bcrypt.
  13197. </p><p>
  13198. Note:
  13199. There is no successful cryptanalysis (status 2015), but
  13200. the amount of memory and the band width of Bcrypt
  13201. may be insufficient to effectively prevent attacks
  13202. with custom hardware like FPGAs, ASICs
  13203. </p><p>
  13204. This implementation uses some parts of Bouncy Castle's BlowfishEngine.
  13205. </p>
  13206. </member>
  13207. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BCrypt.DeriveRawKey(System.Int32,System.Byte[],System.Byte[])">
  13208. Derives a raw 192 bit Bcrypt key
  13209. @param cost the cost factor, treated as an exponent of 2
  13210. @param salt a 16 byte salt
  13211. @param psw the password
  13212. @return a 192 bit key
  13213. </member>
  13214. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BCrypt.SALT_SIZE_BYTES">
  13215. Size of the salt parameter in bytes
  13216. </member>
  13217. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BCrypt.MIN_COST">
  13218. Minimum value of cost parameter, equal to log2(bytes of salt)
  13219. </member>
  13220. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BCrypt.MAX_COST">
  13221. Maximum value of cost parameter (31 == 2,147,483,648)
  13222. </member>
  13223. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BCrypt.MAX_PASSWORD_BYTES">
  13224. Maximum size of password == max (unrestricted) size of Blowfish key
  13225. </member>
  13226. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BCrypt.PasswordToByteArray(System.Char[])">
  13227. Converts a character password to bytes incorporating the required trailing zero byte.
  13228. @param password the password to be encoded.
  13229. @return a byte representation of the password in UTF8 + trailing zero.
  13230. </member>
  13231. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.BCrypt.Generate(System.Byte[],System.Byte[],System.Int32)">
  13232. Calculates the <b>bcrypt</b> hash of a password.
  13233. <p>
  13234. This implements the raw <b>bcrypt</b> function as defined in the bcrypt specification, not
  13235. the crypt encoded version implemented in OpenBSD.
  13236. </p>
  13237. @param password the password bytes (up to 72 bytes) to use for this invocation.
  13238. @param salt the 128 bit salt to use for this invocation.
  13239. @param cost the bcrypt cost parameter. The cost of the bcrypt function grows as
  13240. <code>2^cost</code>. Legal values are 4..31 inclusive.
  13241. @return the output of the raw bcrypt operation: a 192 bit (24 byte) hash.
  13242. </member>
  13243. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.DesEdeKeyGenerator.EngineInit(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.KeyGenerationParameters)">
  13244. initialise the key generator - if strength is set to zero
  13245. the key Generated will be 192 bits in size, otherwise
  13246. strength can be 128 or 192 (or 112 or 168 if you don't count
  13247. parity bits), depending on whether you wish to do 2-key or 3-key
  13248. triple DES.
  13249. @param param the parameters to be used for key generation
  13250. </member>
  13251. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.DesKeyGenerator.EngineInit(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.KeyGenerationParameters)">
  13252. initialise the key generator - if strength is set to zero
  13253. the key generated will be 64 bits in size, otherwise
  13254. strength can be 64 or 56 bits (if you don't count the parity bits).
  13255. @param param the parameters to be used for key generation
  13256. </member>
  13257. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.DHBasicKeyPairGenerator">
  13258. a basic Diffie-Hellman key pair generator.
  13259. This generates keys consistent for use with the basic algorithm for
  13260. Diffie-Hellman.
  13261. </member>
  13262. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.DHKeyPairGenerator">
  13263. a Diffie-Hellman key pair generator.
  13264. This generates keys consistent for use in the MTI/A0 key agreement protocol
  13265. as described in "Handbook of Applied Cryptography", Pages 516-519.
  13266. </member>
  13267. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.DHParametersGenerator.GenerateParameters">
  13268. which Generates the p and g values from the given parameters,
  13269. returning the DHParameters object.
  13270. <p>
  13271. Note: can take a while...</p>
  13272. </member>
  13273. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.DsaKeyPairGenerator">
  13274. a DSA key pair generator.
  13275. This Generates DSA keys in line with the method described
  13276. in <i>FIPS 186-3 B.1 FFC Key Pair Generation</i>.
  13277. </member>
  13278. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.DsaParametersGenerator">
  13279. Generate suitable parameters for DSA, in line with FIPS 186-2, or FIPS 186-3.
  13280. </member>
  13281. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.DsaParametersGenerator.Init(System.Int32,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  13282. <summary>Initialise the generator</summary>
  13283. <remarks>This form can only be used for older DSA (pre-DSA2) parameters</remarks>
  13284. <param name="size">the size of keys in bits (from 512 up to 1024, and a multiple of 64)</param>
  13285. <param name="certainty">measure of robustness of primes (at least 80 for FIPS 186-2 compliance)</param>
  13286. <param name="random">the source of randomness to use</param>
  13287. </member>
  13288. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.DsaParametersGenerator.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DsaParameterGenerationParameters)">
  13289. <summary>Initialise the generator for DSA 2</summary>
  13290. <remarks>You must use this Init method if you need to generate parameters for DSA 2 keys</remarks>
  13291. <param name="parameters">An instance of <c>DsaParameterGenerationParameters</c> used to configure this generator</param>
  13292. </member>
  13293. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.DsaParametersGenerator.GenerateParameters">
  13294. <summary>Generates a set of <c>DsaParameters</c></summary>
  13295. <remarks>Can take a while...</remarks>
  13296. </member>
  13297. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.DsaParametersGenerator.GenerateParameters_FIPS186_3">
  13298. generate suitable parameters for DSA, in line with
  13299. <i>FIPS 186-3 A.1 Generation of the FFC Primes p and q</i>.
  13300. </member>
  13301. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.ECKeyPairGenerator.GenerateKeyPair">
  13302. Given the domain parameters this routine generates an EC key
  13303. pair in accordance with X9.62 section 5.2.1 pages 26, 27.
  13304. </member>
  13305. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.ElGamalKeyPairGenerator">
  13306. a ElGamal key pair generator.
  13307. <p>
  13308. This Generates keys consistent for use with ElGamal as described in
  13309. page 164 of "Handbook of Applied Cryptography".</p>
  13310. </member>
  13311. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.ElGamalParametersGenerator.GenerateParameters">
  13312. * which Generates the p and g values from the given parameters,
  13313. * returning the ElGamalParameters object.
  13314. * <p>
  13315. * Note: can take a while...
  13316. * </p>
  13317. </member>
  13318. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Gost3410KeyPairGenerator">
  13319. a GOST3410 key pair generator.
  13320. This generates GOST3410 keys in line with the method described
  13321. in GOST R 34.10-94.
  13322. </member>
  13323. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Gost3410ParametersGenerator">
  13324. generate suitable parameters for GOST3410.
  13325. </member>
  13326. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Gost3410ParametersGenerator.Init(System.Int32,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  13327. initialise the key generator.
  13328. @param size size of the key
  13329. @param typeProcedure type procedure A,B = 1; A',B' - else
  13330. @param random random byte source.
  13331. </member>
  13332. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Gost3410ParametersGenerator.procedure_C(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  13333. Procedure C
  13334. procedure generates the a value from the given p,q,
  13335. returning the a value.
  13336. </member>
  13337. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Gost3410ParametersGenerator.GenerateParameters">
  13338. which generates the p , q and a values from the given parameters,
  13339. returning the Gost3410Parameters object.
  13340. </member>
  13341. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.HkdfBytesGenerator">
  13342. HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implemented
  13343. according to IETF RFC 5869, May 2010 as specified by H. Krawczyk, IBM
  13344. Research &amp; P. Eronen, Nokia. It uses a HMac internally to compute de OKM
  13345. (output keying material) and is likely to have better security properties
  13346. than KDF's based on just a hash function.
  13347. </member>
  13348. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.HkdfBytesGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  13349. Creates a HKDFBytesGenerator based on the given hash function.
  13350. @param hash the digest to be used as the source of generatedBytes bytes
  13351. </member>
  13352. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.HkdfBytesGenerator.Extract(System.Byte[],System.Byte[])">
  13353. Performs the extract part of the key derivation function.
  13354. @param salt the salt to use
  13355. @param ikm the input keying material
  13356. @return the PRK as KeyParameter
  13357. </member>
  13358. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.HkdfBytesGenerator.ExpandNext">
  13359. Performs the expand part of the key derivation function, using currentT
  13360. as input and output buffer.
  13361. @throws DataLengthException if the total number of bytes generated is larger than the one
  13362. specified by RFC 5869 (255 * HashLen)
  13363. </member>
  13364. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Kdf1BytesGenerator">
  13365. KFD1 generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033
  13366. <br/>
  13367. This implementation is based on IEEE P1363/ISO 18033.
  13368. </member>
  13369. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Kdf1BytesGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  13370. Construct a KDF1 byte generator.
  13371. @param digest the digest to be used as the source of derived keys.
  13372. </member>
  13373. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Kdf2BytesGenerator">
  13374. KDF2 generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033
  13375. <br/>
  13376. This implementation is based on IEEE P1363/ISO 18033.
  13377. </member>
  13378. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Kdf2BytesGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  13379. Construct a KDF2 bytes generator. Generates key material
  13380. according to IEEE P1363 or ISO 18033 depending on the initialisation.
  13381. @param digest the digest to be used as the source of derived keys.
  13382. </member>
  13383. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Mgf1BytesGenerator">
  13384. <summary>Generator for MGF1 as defined in Pkcs 1v2</summary>
  13385. </member>
  13386. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Mgf1BytesGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  13387. <param name="digest">the digest to be used as the source of generated bytes</param>
  13388. </member>
  13389. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Mgf1BytesGenerator.Digest">
  13390. <summary>the underlying digest.</summary>
  13391. </member>
  13392. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Mgf1BytesGenerator.GenerateBytes(System.Byte[],System.Int32,System.Int32)">
  13393. <summary>Fill <c>len</c> bytes of the output buffer with bytes generated from the derivation function.
  13394. </summary>
  13395. </member>
  13396. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.NaccacheSternKeyPairGenerator">
  13397. Key generation parameters for NaccacheStern cipher. For details on this cipher, please see
  13398. http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf
  13399. </member>
  13400. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.NaccacheSternKeyPairGenerator.PermuteList``1(System.Collections.Generic.IList{``0},Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  13401. Generates a permuted ArrayList from the original one. The original List
  13402. is not modified
  13403. @param arr
  13404. the ArrayList to be permuted
  13405. @param rand
  13406. the source of Randomness for permutation
  13407. @return a new IList with the permuted elements.
  13408. </member>
  13409. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.NaccacheSternKeyPairGenerator.FindFirstPrimes(System.Int32)">
  13410. Finds the first 'count' primes starting with 3
  13411. @param count
  13412. the number of primes to find
  13413. @return a vector containing the found primes as Integer
  13414. </member>
  13415. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.OpenBsdBCrypt">
  13416. Password hashing scheme BCrypt,
  13417. designed by Niels Provos and David Mazières, using the
  13418. String format and the Base64 encoding
  13419. of the reference implementation on OpenBSD
  13420. </member>
  13421. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.OpenBsdBCrypt.CreateBcryptString(System.String,System.Byte[],System.Byte[],System.Int32)">
  13422. Creates a 60 character Bcrypt String, including
  13423. version, cost factor, salt and hash, separated by '$'
  13424. @param version the version, 2y,2b or 2a. (2a is not backwards compatible.)
  13425. @param cost the cost factor, treated as an exponent of 2
  13426. @param salt a 16 byte salt
  13427. @param password the password
  13428. @return a 60 character Bcrypt String
  13429. </member>
  13430. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.OpenBsdBCrypt.Generate(System.Char[],System.Byte[],System.Int32)">
  13431. Creates a 60 character Bcrypt String, including
  13432. version, cost factor, salt and hash, separated by '$' using version
  13433. '2y'.
  13434. @param cost the cost factor, treated as an exponent of 2
  13435. @param salt a 16 byte salt
  13436. @param password the password
  13437. @return a 60 character Bcrypt String
  13438. </member>
  13439. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.OpenBsdBCrypt.Generate(System.String,System.Char[],System.Byte[],System.Int32)">
  13440. Creates a 60 character Bcrypt String, including
  13441. version, cost factor, salt and hash, separated by '$'
  13442. @param version the version, may be 2b, 2y or 2a. (2a is not backwards compatible.)
  13443. @param cost the cost factor, treated as an exponent of 2
  13444. @param salt a 16 byte salt
  13445. @param password the password
  13446. @return a 60 character Bcrypt String
  13447. </member>
  13448. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.OpenBsdBCrypt.CheckPassword(System.String,System.Char[])">
  13449. Checks if a password corresponds to a 60 character Bcrypt String
  13450. @param bcryptString a 60 character Bcrypt String, including
  13451. version, cost factor, salt and hash,
  13452. separated by '$'
  13453. @param password the password as an array of chars
  13454. @return true if the password corresponds to the
  13455. Bcrypt String, otherwise false
  13456. </member>
  13457. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator">
  13458. <description>
  13459. Generator for PBE derived keys and IVs as usd by OpenSSL. Originally this scheme was a simple extension of
  13460. PKCS 5 V2.0 Scheme 1 using MD5 with an iteration count of 1. The default digest was changed to SHA-256 with
  13461. OpenSSL 1.1.0. This implementation still defaults to MD5, but the digest can now be set.
  13462. </description>
  13463. </member>
  13464. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.#ctor">
  13465. <description>
  13466. Construct a OpenSSL Parameters generator - digest the original MD5.
  13467. </description>
  13468. </member>
  13469. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  13470. <description>
  13471. Construct a OpenSSL Parameters generator - digest as specified.
  13472. </description>
  13473. <param name="digest">the digest to use as the PRF.</param>
  13474. </member>
  13475. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.Init(System.Byte[],System.Byte[])">
  13476. Initialise - note the iteration count for this algorithm is fixed at 1.
  13477. @param password password to use.
  13478. @param salt salt to use.
  13479. </member>
  13480. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.GenerateDerivedKey(System.Int32)">
  13481. the derived key function, the ith hash of the password and the salt.
  13482. </member>
  13483. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.GenerateDerivedMacParameters(System.Int32)">
  13484. Generate a key parameter for use with a MAC derived from the password,
  13485. salt, and iteration count we are currently initialised with.
  13486. @param keySize the size of the key we want (in bits)
  13487. @return a KeyParameter object.
  13488. @exception ArgumentException if the key length larger than the base hash size.
  13489. </member>
  13490. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator">
  13491. Generator for Pbe derived keys and ivs as defined by Pkcs 12 V1.0.
  13492. <p>
  13493. The document this implementation is based on can be found at
  13494. <a href="http://www.rsasecurity.com/rsalabs/pkcs/pkcs-12/index.html">
  13495. RSA's Pkcs12 Page</a>
  13496. </p>
  13497. </member>
  13498. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  13499. Construct a Pkcs 12 Parameters generator.
  13500. @param digest the digest to be used as the source of derived keys.
  13501. @exception ArgumentException if an unknown digest is passed in.
  13502. </member>
  13503. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator.Adjust(System.Byte[],System.Int32,System.Byte[])">
  13504. add a + b + 1, returning the result in a. The a value is treated
  13505. as a BigInteger of length (b.Length * 8) bits. The result is
  13506. modulo 2^b.Length in case of overflow.
  13507. </member>
  13508. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator.GenerateDerivedKey(System.Int32,System.Int32)">
  13509. generation of a derived key ala Pkcs12 V1.0.
  13510. </member>
  13511. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator.GenerateDerivedMacParameters(System.Int32)">
  13512. Generate a key parameter for use with a MAC derived from the password,
  13513. salt, and iteration count we are currently initialised with.
  13514. @param keySize the size of the key we want (in bits)
  13515. @return a KeyParameter object.
  13516. </member>
  13517. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs5S1ParametersGenerator">
  13518. Generator for Pbe derived keys and ivs as defined by Pkcs 5 V2.0 Scheme 1.
  13519. Note this generator is limited to the size of the hash produced by the
  13520. digest used to drive it.
  13521. <p>
  13522. The document this implementation is based on can be found at
  13523. <a href="http://www.rsasecurity.com/rsalabs/pkcs/pkcs-5/index.html">
  13524. RSA's Pkcs5 Page</a>
  13525. </p>
  13526. </member>
  13527. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs5S1ParametersGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  13528. Construct a Pkcs 5 Scheme 1 Parameters generator.
  13529. @param digest the digest to be used as the source of derived keys.
  13530. </member>
  13531. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs5S1ParametersGenerator.GenerateDerivedKey">
  13532. the derived key function, the ith hash of the mPassword and the mSalt.
  13533. </member>
  13534. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs5S1ParametersGenerator.GenerateDerivedMacParameters(System.Int32)">
  13535. Generate a key parameter for use with a MAC derived from the mPassword,
  13536. mSalt, and iteration count we are currently initialised with.
  13537. @param keySize the size of the key we want (in bits)
  13538. @return a KeyParameter object.
  13539. @exception ArgumentException if the key length larger than the base hash size.
  13540. </member>
  13541. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs5S2ParametersGenerator">
  13542. Generator for Pbe derived keys and ivs as defined by Pkcs 5 V2.0 Scheme 2.
  13543. This generator uses a SHA-1 HMac as the calculation function.
  13544. <p>
  13545. The document this implementation is based on can be found at
  13546. <a href="http://www.rsasecurity.com/rsalabs/pkcs/pkcs-5/index.html">
  13547. RSA's Pkcs5 Page</a></p>
  13548. </member>
  13549. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs5S2ParametersGenerator.#ctor">
  13550. construct a Pkcs5 Scheme 2 Parameters generator.
  13551. </member>
  13552. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Pkcs5S2ParametersGenerator.GenerateDerivedMacParameters(System.Int32)">
  13553. Generate a key parameter for use with a MAC derived from the password,
  13554. salt, and iteration count we are currently initialised with.
  13555. @param keySize the size of the key we want (in bits)
  13556. @return a KeyParameter object.
  13557. </member>
  13558. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator">
  13559. <summary>
  13560. Generates keys for the Poly1305 MAC.
  13561. </summary>
  13562. <remarks>
  13563. Poly1305 keys are 256 bit keys consisting of a 128 bit secret key used for the underlying block
  13564. cipher followed by a 128 bit {@code r} value used for the polynomial portion of the Mac. <br/>
  13565. The {@code r} value has a specific format with some bits required to be cleared, resulting in an
  13566. effective 106 bit key. <br/>
  13567. A separately generated 256 bit key can be modified to fit the Poly1305 key format by using the
  13568. {@link #clamp(byte[])} method to clear the required bits.
  13569. </remarks>
  13570. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305"/>
  13571. </member>
  13572. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.EngineInit(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.KeyGenerationParameters)">
  13573. <summary>
  13574. Initialises the key generator.
  13575. </summary>
  13576. <remarks>
  13577. Poly1305 keys are always 256 bits, so the key length in the provided parameters is ignored.
  13578. </remarks>
  13579. </member>
  13580. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.EngineGenerateKey">
  13581. <summary>
  13582. Generates a 256 bit key in the format required for Poly1305 - e.g.
  13583. <code>k[0] ... k[15], r[0] ... r[15]</code> with the required bits in <code>r</code> cleared
  13584. as per <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.Clamp(System.Byte[])"/>.
  13585. </summary>
  13586. </member>
  13587. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.Clamp(System.Byte[])">
  13588. <summary>
  13589. Modifies an existing 32 byte key value to comply with the requirements of the Poly1305 key by
  13590. clearing required bits in the <code>r</code> (second 16 bytes) portion of the key.<br/>
  13591. Specifically:
  13592. <ul>
  13593. <li>r[3], r[7], r[11], r[15] have top four bits clear (i.e., are {0, 1, . . . , 15})</li>
  13594. <li>r[4], r[8], r[12] have bottom two bits clear (i.e., are in {0, 4, 8, . . . , 252})</li>
  13595. </ul>
  13596. </summary>
  13597. <param name="key">a 32 byte key value <code>k[0] ... k[15], r[0] ... r[15]</code></param>
  13598. </member>
  13599. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.CheckKey(System.Byte[])">
  13600. <summary>
  13601. Checks a 32 byte key for compliance with the Poly1305 key requirements, e.g.
  13602. <code>k[0] ... k[15], r[0] ... r[15]</code> with the required bits in <code>r</code> cleared
  13603. as per <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.Clamp(System.Byte[])"/>.
  13604. </summary>
  13605. <param name="key">Key.</param>
  13606. <exception cref="T:System.ArgumentException">if the key is of the wrong length, or has invalid bits set
  13607. in the <code>r</code> portion of the key.</exception>
  13608. </member>
  13609. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.RsaBlindingFactorGenerator">
  13610. Generate a random factor suitable for use with RSA blind signatures
  13611. as outlined in Chaum's blinding and unblinding as outlined in
  13612. "Handbook of Applied Cryptography", page 475.
  13613. </member>
  13614. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.RsaBlindingFactorGenerator.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  13615. Initialise the factor generator
  13616. @param param the necessary RSA key parameters.
  13617. </member>
  13618. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.RsaBlindingFactorGenerator.GenerateBlindingFactor">
  13619. Generate a suitable blind factor for the public key the generator was initialised with.
  13620. @return a random blind factor
  13621. </member>
  13622. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.RsaKeyPairGenerator">
  13623. an RSA key pair generator.
  13624. </member>
  13625. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.RsaKeyPairGenerator.ChooseRandomPrime(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  13626. <summary>Choose a random prime value for use with RSA</summary>
  13627. <param name="bitlength">the bit-length of the returned prime</param>
  13628. <param name="e">the RSA public exponent</param>
  13629. <returns>a prime p, with (p-1) relatively prime to e</returns>
  13630. </member>
  13631. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.SCrypt">
  13632. <summary>Implementation of the scrypt a password-based key derivation function.</summary>
  13633. <remarks>
  13634. Scrypt was created by Colin Percival and is specified in
  13635. <a href="http://tools.ietf.org/html/draft-josefsson-scrypt-kdf-01">draft-josefsson-scrypt-kd</a>.
  13636. </remarks>
  13637. </member>
  13638. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.SCrypt.Generate(System.Byte[],System.Byte[],System.Int32,System.Int32,System.Int32,System.Int32)">
  13639. <summary>Generate a key using the scrypt key derivation function.</summary>
  13640. <param name="P">the bytes of the pass phrase.</param>
  13641. <param name="S">the salt to use for this invocation.</param>
  13642. <param name="N">CPU/Memory cost parameter. Must be larger than 1, a power of 2 and less than
  13643. <code>2^(128 * r / 8)</code>.</param>
  13644. <param name="r">the block size, must be >= 1.</param>
  13645. <param name="p">Parallelization parameter. Must be a positive integer less than or equal to
  13646. <code>int.MaxValue / (128 * r * 8)</code>.</param>
  13647. <param name="dkLen">the length of the key to generate.</param>
  13648. <returns>the generated key.</returns>
  13649. </member>
  13650. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAlphabetMapper">
  13651. Base interface for mapping from an alphabet to a set of indexes
  13652. suitable for use with FPE.
  13653. </member>
  13654. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAlphabetMapper.Radix">
  13655. <summary>
  13656. Return the number of characters in the alphabet.
  13657. </summary>
  13658. <returns>the radix for the alphabet.</returns>
  13659. </member>
  13660. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAlphabetMapper.ConvertToIndexes(System.Char[])">
  13661. <summary>
  13662. Return the passed in char[] as a byte array of indexes (indexes
  13663. can be more than 1 byte)
  13664. </summary>
  13665. <returns>an index array.</returns>
  13666. <param name="input">characters to be mapped.</param>
  13667. </member>
  13668. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAlphabetMapper.ConvertToChars(System.Byte[])">
  13669. <summary>
  13670. Return a char[] for this alphabet based on the indexes passed.
  13671. </summary>
  13672. <returns>an array of char corresponding to the index values.</returns>
  13673. <param name="input">input array of indexes.</param>
  13674. </member>
  13675. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher">
  13676. <remarks>Base interface for a public/private key block cipher.</remarks>
  13677. </member>
  13678. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher.AlgorithmName">
  13679. <summary>The name of the algorithm this cipher implements.</summary>
  13680. </member>
  13681. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  13682. <summary>Initialise the cipher.</summary>
  13683. <param name="forEncryption">Initialise for encryption if true, for decryption if false.</param>
  13684. <param name="parameters">The key or other data required by the cipher.</param>
  13685. </member>
  13686. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher.GetInputBlockSize">
  13687. <returns>The maximum size, in bytes, an input block may be.</returns>
  13688. </member>
  13689. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher.GetOutputBlockSize">
  13690. <returns>The maximum size, in bytes, an output block will be.</returns>
  13691. </member>
  13692. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  13693. <summary>Process a block.</summary>
  13694. <param name="inBuf">The input buffer.</param>
  13695. <param name="inOff">The offset into <paramref>inBuf</paramref> that the input block begins.</param>
  13696. <param name="inLen">The length of the input block.</param>
  13697. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.InvalidCipherTextException">Input decrypts improperly.</exception>
  13698. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.DataLengthException">Input is too large for the cipher.</exception>
  13699. </member>
  13700. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricCipherKeyPairGenerator">
  13701. interface that a public/private key pair generator should conform to.
  13702. </member>
  13703. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricCipherKeyPairGenerator.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.KeyGenerationParameters)">
  13704. intialise the key pair generator.
  13705. @param the parameters the key pair is to be initialised with.
  13706. </member>
  13707. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricCipherKeyPairGenerator.GenerateKeyPair">
  13708. return an AsymmetricCipherKeyPair containing the Generated keys.
  13709. @return an AsymmetricCipherKeyPair containing the Generated keys.
  13710. </member>
  13711. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBasicAgreement">
  13712. The basic interface that basic Diffie-Hellman implementations
  13713. conforms to.
  13714. </member>
  13715. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBasicAgreement.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  13716. initialise the agreement engine.
  13717. </member>
  13718. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBasicAgreement.GetFieldSize">
  13719. return the field size for the agreement algorithm in bytes.
  13720. </member>
  13721. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBasicAgreement.CalculateAgreement(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  13722. given a public key from a given party calculate the next
  13723. message in the agreement sequence.
  13724. </member>
  13725. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher">
  13726. <remarks>Base interface for a symmetric key block cipher.</remarks>
  13727. </member>
  13728. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher.AlgorithmName">
  13729. <summary>The name of the algorithm this cipher implements.</summary>
  13730. </member>
  13731. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  13732. <summary>Initialise the cipher.</summary>
  13733. <param name="forEncryption">Initialise for encryption if true, for decryption if false.</param>
  13734. <param name="parameters">The key or other data required by the cipher.</param>
  13735. </member>
  13736. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher.GetBlockSize">
  13737. <returns>The block size for this cipher, in bytes.</returns>
  13738. </member>
  13739. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  13740. <summary>Process a block.</summary>
  13741. <param name="inBuf">The input buffer.</param>
  13742. <param name="inOff">The offset into <paramref>inBuf</paramref> that the input block begins.</param>
  13743. <param name="outBuf">The output buffer.</param>
  13744. <param name="outOff">The offset into <paramref>outBuf</paramref> to write the output block.</param>
  13745. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.DataLengthException">If input block is wrong size, or outBuf too small.</exception>
  13746. <returns>The number of bytes processed and produced.</returns>
  13747. </member>
  13748. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher.ProcessBlock(System.ReadOnlySpan{System.Byte},System.Span{System.Byte})">
  13749. <summary>Process a block.</summary>
  13750. <param name="input">The input block as a span.</param>
  13751. <param name="output">The output span.</param>
  13752. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.DataLengthException">If input block is wrong size, or output span too small.</exception>
  13753. <returns>The number of bytes processed and produced.</returns>
  13754. </member>
  13755. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockResult">
  13756. <summary>
  13757. Operators that reduce their input to a single block return an object
  13758. of this type.
  13759. </summary>
  13760. </member>
  13761. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockResult.Collect">
  13762. <summary>
  13763. Return the final result of the operation.
  13764. </summary>
  13765. <returns>A block of bytes, representing the result of an operation.</returns>
  13766. </member>
  13767. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockResult.Collect(System.Byte[],System.Int32)">
  13768. <summary>
  13769. Store the final result of the operation by copying it into the destination array.
  13770. </summary>
  13771. <returns>The number of bytes copied into destination.</returns>
  13772. <param name="destination">The byte array to copy the result into.</param>
  13773. <param name="offset">The offset into destination to start copying the result at.</param>
  13774. </member>
  13775. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockResult.Collect(System.Span{System.Byte})">
  13776. <summary>
  13777. Store the final result of the operation by copying it into the destination span.
  13778. </summary>
  13779. <returns>The number of bytes copied into destination.</returns>
  13780. <param name="destination">The span to copy the result into.</param>
  13781. </member>
  13782. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBufferedCipher">
  13783. <remarks>Block cipher engines are expected to conform to this interface.</remarks>
  13784. </member>
  13785. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBufferedCipher.AlgorithmName">
  13786. <summary>The name of the algorithm this cipher implements.</summary>
  13787. </member>
  13788. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBufferedCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  13789. <summary>Initialise the cipher.</summary>
  13790. <param name="forEncryption">If true the cipher is initialised for encryption,
  13791. if false for decryption.</param>
  13792. <param name="parameters">The key and other data required by the cipher.</param>
  13793. </member>
  13794. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBufferedCipher.Reset">
  13795. <summary>
  13796. Reset the cipher. After resetting the cipher is in the same state
  13797. as it was after the last init (if there was one).
  13798. </summary>
  13799. </member>
  13800. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipher">
  13801. <summary>
  13802. Base interface for a ciphers that do not require data to be block aligned.
  13803. <para>
  13804. Note: In cases where the underlying algorithm is block based, these ciphers may add or remove padding as needed.
  13805. </para>
  13806. </summary>
  13807. </member>
  13808. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipher.GetMaxOutputSize(System.Int32)">
  13809. <summary>
  13810. Return the size of the output buffer required for a Write() plus a
  13811. close() with the write() being passed inputLen bytes.
  13812. <para>
  13813. The returned size may be dependent on the initialisation of this cipher
  13814. and may not be accurate once subsequent input data is processed as the cipher may
  13815. add, add or remove padding, as it sees fit.
  13816. </para>
  13817. </summary>
  13818. <returns>The space required to accommodate a call to processBytes and doFinal with inputLen bytes of input.</returns>
  13819. <param name="inputLen">The length of the expected input.</param>
  13820. </member>
  13821. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipher.GetUpdateOutputSize(System.Int32)">
  13822. <summary>
  13823. Return the size of the output buffer required for a write() with the write() being
  13824. passed inputLen bytes and just updating the cipher output.
  13825. </summary>
  13826. <returns>The space required to accommodate a call to processBytes with inputLen bytes of input.</returns>
  13827. <param name="inputLen">The length of the expected input.</param>
  13828. </member>
  13829. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipher.Stream">
  13830. <summary>
  13831. Gets the stream for reading/writing data processed/to be processed.
  13832. </summary>
  13833. <value>The stream associated with this cipher.</value>
  13834. </member>
  13835. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherBuilder">
  13836. <summary>
  13837. Base interface for cipher builders.
  13838. </summary>
  13839. </member>
  13840. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherBuilder.AlgorithmDetails">
  13841. <summary>
  13842. Return the algorithm and parameter details associated with any cipher built.
  13843. </summary>
  13844. </member>
  13845. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherBuilder.GetMaxOutputSize(System.Int32)">
  13846. <summary>
  13847. Return the maximum output size that a given input will produce.
  13848. </summary>
  13849. <param name="inputLen">the length of the expected input.</param>
  13850. <returns>The maximum possible output size that can produced for the expected input length.</returns>
  13851. </member>
  13852. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherBuilder.BuildCipher(System.IO.Stream)">
  13853. <summary>
  13854. Build a cipher that operates on the passed in stream.
  13855. </summary>
  13856. <param name="stream">The stream to write/read any encrypted/decrypted data.</param>
  13857. <returns>A cipher based around the given stream.</returns>
  13858. </member>
  13859. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherBuilderWithKey">
  13860. <summary>
  13861. A cipher builder that can also return the key it was initialized with.
  13862. </summary>
  13863. </member>
  13864. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherBuilderWithKey.Key">
  13865. <summary>
  13866. Return the key we were initialized with.
  13867. </summary>
  13868. </member>
  13869. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters">
  13870. all parameter classes implement this.
  13871. </member>
  13872. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDecryptorBuilderProvider">
  13873. <summary>
  13874. Interface describing a provider of cipher builders for creating decrypting ciphers.
  13875. </summary>
  13876. </member>
  13877. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDecryptorBuilderProvider.CreateDecryptorBuilder(System.Object)">
  13878. <summary>
  13879. Return a cipher builder for creating decrypting ciphers.
  13880. </summary>
  13881. <param name="algorithmDetails">The algorithm details/parameters to use to create the final cipher.</param>
  13882. <returns>A new cipher builder.</returns>
  13883. </member>
  13884. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDerivationFunction">
  13885. base interface for general purpose byte derivation functions.
  13886. </member>
  13887. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDerivationFunction.Digest">
  13888. return the message digest used as the basis for the function
  13889. </member>
  13890. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDerivationParameters">
  13891. Parameters for key/byte stream derivation classes
  13892. </member>
  13893. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest">
  13894. <remarks>Base interface for a message digest.</remarks>
  13895. </member>
  13896. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest.AlgorithmName">
  13897. <summary>The algorithm name.</summary>
  13898. </member>
  13899. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest.GetDigestSize">
  13900. <summary>Return the size, in bytes, of the digest produced by this message digest.</summary>
  13901. <returns>the size, in bytes, of the digest produced by this message digest.</returns>
  13902. </member>
  13903. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest.GetByteLength">
  13904. <summary>Return the size, in bytes, of the internal buffer used by this digest.</summary>
  13905. <returns>the size, in bytes, of the internal buffer used by this digest.</returns>
  13906. </member>
  13907. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest.Update(System.Byte)">
  13908. <summary>Update the message digest with a single byte.</summary>
  13909. <param name="input">the input byte to be entered.</param>
  13910. </member>
  13911. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  13912. <summary>Update the message digest with a block of bytes.</summary>
  13913. <param name="input">the byte array containing the data.</param>
  13914. <param name="inOff">the offset into the byte array where the data starts.</param>
  13915. <param name="inLen">the length of the data.</param>
  13916. </member>
  13917. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest.BlockUpdate(System.ReadOnlySpan{System.Byte})">
  13918. <summary>Update the message digest with a span of bytes.</summary>
  13919. <param name="input">the span containing the data.</param>
  13920. </member>
  13921. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest.DoFinal(System.Byte[],System.Int32)">
  13922. <summary>Close the digest, producing the final digest value.</summary>
  13923. <remarks>This call leaves the digest reset.</remarks>
  13924. <param name="output">the byte array the digest is to be copied into.</param>
  13925. <param name="outOff">the offset into the byte array the digest is to start at.</param>
  13926. <returns>the number of bytes written</returns>
  13927. </member>
  13928. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest.DoFinal(System.Span{System.Byte})">
  13929. <summary>Close the digest, producing the final digest value.</summary>
  13930. <remarks>This call leaves the digest reset.</remarks>
  13931. <param name="output">the span the digest is to be copied into.</param>
  13932. <returns>the number of bytes written</returns>
  13933. </member>
  13934. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest.Reset">
  13935. <summary>Reset the digest back to its initial state.</summary>
  13936. </member>
  13937. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigestFactory">
  13938. <summary>
  13939. Base interface for operator factories that create stream-based digest calculators.
  13940. </summary>
  13941. </member>
  13942. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigestFactory.AlgorithmDetails">
  13943. <summary>The algorithm details object for calculators made by this factory.</summary>
  13944. </member>
  13945. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigestFactory.DigestLength">
  13946. <summary>Return the size of the digest associated with this factory.</summary>
  13947. <returns>The length of the digest produced by this calculators from this factory in bytes.</returns>
  13948. </member>
  13949. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigestFactory.CreateCalculator">
  13950. <summary>
  13951. Create a stream calculator for the digest associated with this factory. The stream
  13952. calculator is used for the actual operation of entering the data to be digested
  13953. and producing the digest block.
  13954. </summary>
  13955. <returns>A calculator producing an IBlockResult with the final digest in it.</returns>
  13956. </member>
  13957. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDsa">
  13958. <summary>Interface for classes implementing the Digital Signature Algorithm</summary>
  13959. </member>
  13960. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDsa.AlgorithmName">
  13961. <summary>The algorithm name.</summary>
  13962. </member>
  13963. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDsa.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  13964. <summary>Initialise the signer for signature generation or signature verification.</summary>
  13965. <param name="forSigning">true if we are generating a signature, false otherwise.</param>
  13966. <param name="parameters">key parameters for signature generation.</param>
  13967. </member>
  13968. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDsa.GenerateSignature(System.Byte[])">
  13969. <summary>Sign the passed in message (usually the output of a hash function).</summary>
  13970. <param name="message">the message to be signed.</param>
  13971. <returns>two big integers representing the r and s values respectively.</returns>
  13972. </member>
  13973. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDsa.Order">
  13974. <summary>The order of the group that the r, s values in signatures belong to.</summary>
  13975. </member>
  13976. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDsa.VerifySignature(System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  13977. <summary>Verify the message message against the signature values r and s.</summary>
  13978. <param name="message">the message that was supposed to have been signed.</param>
  13979. <param name="r">the r signature value.</param>
  13980. <param name="s">the s signature value.</param>
  13981. </member>
  13982. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEncapsulatedSecretExtractor.ExtractSecret(System.Byte[])">
  13983. <summary>
  13984. Generate an exchange pair based on the recipient public key.
  13985. </summary>
  13986. <param name="encapsulation"> the encapsulated secret.</param>
  13987. </member>
  13988. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEncapsulatedSecretExtractor.EncapsulationLength">
  13989. <summary>
  13990. The length in bytes of the encapsulation.
  13991. </summary>
  13992. </member>
  13993. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEncapsulatedSecretGenerator.GenerateEncapsulated(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  13994. <summary>
  13995. Generate an exchange pair based on the recipient public key.
  13996. </summary>
  13997. <param name="recipientKey"></param>
  13998. <returns> An SecretWithEncapsulation derived from the recipient public key.</returns>
  13999. </member>
  14000. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySource">
  14001. <summary>
  14002. Base interface describing an entropy source for a DRBG.
  14003. </summary>
  14004. </member>
  14005. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySource.IsPredictionResistant">
  14006. <summary>
  14007. Return whether or not this entropy source is regarded as prediction resistant.
  14008. </summary>
  14009. <value><c>true</c> if this instance is prediction resistant; otherwise, <c>false</c>.</value>
  14010. </member>
  14011. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySource.GetEntropy">
  14012. <summary>
  14013. Return a byte array of entropy.
  14014. </summary>
  14015. <returns>The entropy bytes.</returns>
  14016. </member>
  14017. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySource.EntropySize">
  14018. <summary>
  14019. Return the number of bits of entropy this source can produce.
  14020. </summary>
  14021. <value>The size, in bits, of the return value of getEntropy.</value>
  14022. </member>
  14023. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySourceProvider">
  14024. <summary>
  14025. Base interface describing a provider of entropy sources.
  14026. </summary>
  14027. </member>
  14028. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySourceProvider.Get(System.Int32)">
  14029. <summary>
  14030. Return an entropy source providing a block of entropy.
  14031. </summary>
  14032. <param name="bitsRequired">The size of the block of entropy required.</param>
  14033. <returns>An entropy source providing bitsRequired blocks of entropy.</returns>
  14034. </member>
  14035. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IKeyUnwrapper">
  14036. <summary>
  14037. Base interface for a key unwrapper.
  14038. </summary>
  14039. </member>
  14040. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IKeyUnwrapper.AlgorithmDetails">
  14041. <summary>
  14042. The parameter set used to configure this key unwrapper.
  14043. </summary>
  14044. </member>
  14045. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IKeyUnwrapper.Unwrap(System.Byte[],System.Int32,System.Int32)">
  14046. <summary>
  14047. Unwrap the passed in data.
  14048. </summary>
  14049. <param name="cipherText">The array containing the data to be unwrapped.</param>
  14050. <param name="offset">The offset into cipherText at which the unwrapped data starts.</param>
  14051. <param name="length">The length of the data to be unwrapped.</param>
  14052. <returns>an IBlockResult containing the unwrapped key data.</returns>
  14053. </member>
  14054. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IKeyWrapper">
  14055. <summary>
  14056. Base interface for a key wrapper.
  14057. </summary>
  14058. </member>
  14059. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IKeyWrapper.AlgorithmDetails">
  14060. <summary>
  14061. The parameter set used to configure this key wrapper.
  14062. </summary>
  14063. </member>
  14064. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IKeyWrapper.Wrap(System.Byte[])">
  14065. <summary>
  14066. Wrap the passed in key data.
  14067. </summary>
  14068. <param name="keyData">The key data to be wrapped.</param>
  14069. <returns>an IBlockResult containing the wrapped key data.</returns>
  14070. </member>
  14071. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac">
  14072. <summary>The base interface for implementations of message authentication codes (MACs).</summary>
  14073. </member>
  14074. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  14075. <summary>Initialise the MAC.</summary>
  14076. <param name="parameters">The key or other data required by the MAC.</param>
  14077. </member>
  14078. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac.AlgorithmName">
  14079. <summary>The algorithm name.</summary>
  14080. </member>
  14081. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac.GetMacSize">
  14082. <summary>Return the size, in bytes, of the MAC produced by this implementation.</summary>
  14083. <returns>the size, in bytes, of the MAC produced by this implementation.</returns>
  14084. </member>
  14085. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac.Update(System.Byte)">
  14086. <summary>Update the MAC with a single byte.</summary>
  14087. <param name="input">the input byte to be entered.</param>
  14088. </member>
  14089. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  14090. <summary>Update the MAC with a block of bytes.</summary>
  14091. <param name="input">the byte array containing the data.</param>
  14092. <param name="inOff">the offset into the byte array where the data starts.</param>
  14093. <param name="inLen">the length of the data.</param>
  14094. </member>
  14095. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac.BlockUpdate(System.ReadOnlySpan{System.Byte})">
  14096. <summary>Update the MAC with a span of bytes.</summary>
  14097. <param name="input">the span containing the data.</param>
  14098. </member>
  14099. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac.DoFinal(System.Byte[],System.Int32)">
  14100. <summary>Perform final calculations, producing the result MAC.</summary>
  14101. <remarks>This call leaves the MAC reset.</remarks>
  14102. <param name="output">the byte array the MAC is to be copied into.</param>
  14103. <param name="outOff">the offset into the byte array the MAC is to start at.</param>
  14104. <returns>the number of bytes written</returns>
  14105. </member>
  14106. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac.DoFinal(System.Span{System.Byte})">
  14107. <summary>Perform final calculations, producing the result MAC.</summary>
  14108. <remarks>This call leaves the MAC reset.</remarks>
  14109. <param name="output">the span the MAC is to be copied into.</param>
  14110. <returns>the number of bytes written</returns>
  14111. </member>
  14112. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac.Reset">
  14113. <summary>Reset the MAC back to its initial state.</summary>
  14114. </member>
  14115. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMacFactory.AlgorithmDetails">
  14116. <summary>The algorithm details object for this calculator.</summary>
  14117. </member>
  14118. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMacFactory.CreateCalculator">
  14119. <summary>
  14120. Create a stream calculator for this signature calculator. The stream
  14121. calculator is used for the actual operation of entering the data to be signed
  14122. and producing the signature block.
  14123. </summary>
  14124. <returns>A calculator producing an IBlockResult with a signature in it.</returns>
  14125. </member>
  14126. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.InvalidCipherTextException">
  14127. <summary>This exception is thrown whenever we find something we don't expect in a message.</summary>
  14128. </member>
  14129. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISecretWithEncapsulation.GetSecret">
  14130. <summary>
  14131. Return the secret associated with the encapsulation.
  14132. </summary>
  14133. <returns> the secret the encapsulation is for.</returns>
  14134. </member>
  14135. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISecretWithEncapsulation.GetEncapsulation">
  14136. <summary>
  14137. Return the data that carries the secret in its encapsulated form.
  14138. </summary>
  14139. <returns> the encapsulation of the secret.</returns>
  14140. </member>
  14141. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory">
  14142. <summary>
  14143. Base interface for operators that serve as stream-based signature calculators.
  14144. </summary>
  14145. </member>
  14146. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory.AlgorithmDetails">
  14147. <summary>The algorithm details object for this calculator.</summary>
  14148. </member>
  14149. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory.CreateCalculator">
  14150. <summary>
  14151. Create a stream calculator for this signature calculator. The stream
  14152. calculator is used for the actual operation of entering the data to be signed
  14153. and producing the signature block.
  14154. </summary>
  14155. <returns>A calculator producing an IBlockResult with a signature in it.</returns>
  14156. </member>
  14157. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISigner.AlgorithmName">
  14158. <summary>The algorithm name.</summary>
  14159. </member>
  14160. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISigner.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  14161. <summary>Initialise the signer for signing or verification.</summary>
  14162. <param name="forSigning">true if for signing, false otherwise.</param>
  14163. <param name="parameters">necessary parameters.</param>
  14164. </member>
  14165. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISigner.Update(System.Byte)">
  14166. <summary>Update the signer with a single byte.</summary>
  14167. <param name="input">the input byte to be entered.</param>
  14168. </member>
  14169. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISigner.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  14170. <summary>Update the signer with a block of bytes.</summary>
  14171. <param name="input">the byte array containing the data.</param>
  14172. <param name="inOff">the offset into the byte array where the data starts.</param>
  14173. <param name="inLen">the length of the data.</param>
  14174. </member>
  14175. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISigner.BlockUpdate(System.ReadOnlySpan{System.Byte})">
  14176. <summary>Update the signer with a span of bytes.</summary>
  14177. <param name="input">the span containing the data.</param>
  14178. </member>
  14179. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISigner.GenerateSignature">
  14180. <summary>Generate a signature for the message we've been loaded with using the key we were initialised with.
  14181. </summary>
  14182. <returns>A byte array containing the signature for the message.</returns>
  14183. </member>
  14184. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISigner.VerifySignature(System.Byte[])">
  14185. <summary>Return true if the internal state represents the signature described in the passed in array.
  14186. </summary>
  14187. <param name="signature">an array containing the candidate signature to verify.</param>
  14188. <returns>true if the internal state represents the signature described in the passed in array.</returns>
  14189. </member>
  14190. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISigner.Reset">
  14191. <summary>Reset the signer back to its initial state.</summary>
  14192. </member>
  14193. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignerWithRecovery">
  14194. Signer with message recovery.
  14195. </member>
  14196. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignerWithRecovery.HasFullMessage">
  14197. Returns true if the signer has recovered the full message as
  14198. part of signature verification.
  14199. @return true if full message recovered.
  14200. </member>
  14201. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignerWithRecovery.GetRecoveredMessage">
  14202. Returns a reference to what message was recovered (if any).
  14203. @return full/partial message, null if nothing.
  14204. </member>
  14205. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignerWithRecovery.UpdateWithRecoveredMessage(System.Byte[])">
  14206. Perform an update with the recovered message before adding any other data. This must
  14207. be the first update method called, and calling it will result in the signer assuming
  14208. that further calls to update will include message content past what is recoverable.
  14209. @param signature the signature that we are in the process of verifying.
  14210. @throws IllegalStateException
  14211. </member>
  14212. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IStreamCalculator`1">
  14213. <summary>
  14214. Base interface for cryptographic operations such as Hashes, MACs, and Signatures which reduce a stream of data
  14215. to a single value.
  14216. </summary>
  14217. </member>
  14218. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IStreamCalculator`1.Stream">
  14219. <summary>Return a "sink" stream which only exists to update the implementing object.</summary>
  14220. <returns>A stream to write to in order to update the implementing object.</returns>
  14221. </member>
  14222. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IStreamCalculator`1.GetResult">
  14223. <summary>
  14224. Return the result of processing the stream. This value is only available once the stream
  14225. has been closed.
  14226. </summary>
  14227. <returns>The result of processing the stream.</returns>
  14228. </member>
  14229. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IStreamCipher">
  14230. <summary>The interface stream ciphers conform to.</summary>
  14231. </member>
  14232. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IStreamCipher.AlgorithmName">
  14233. <summary>The name of the algorithm this cipher implements.</summary>
  14234. </member>
  14235. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IStreamCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  14236. <summary>Initialise the cipher.</summary>
  14237. <param name="forEncryption">If true the cipher is initialised for encryption,
  14238. if false for decryption.</param>
  14239. <param name="parameters">The key and other data required by the cipher.</param>
  14240. <exception cref="T:System.ArgumentException">
  14241. If the parameters argument is inappropriate.
  14242. </exception>
  14243. </member>
  14244. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IStreamCipher.ReturnByte(System.Byte)">
  14245. <summary>encrypt/decrypt a single byte returning the result.</summary>
  14246. <param name="input">the byte to be processed.</param>
  14247. <returns>the result of processing the input byte.</returns>
  14248. </member>
  14249. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IStreamCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  14250. <summary>
  14251. Process a block of bytes from <paramref name="input"/>, putting the result into <paramref name="output"/>.
  14252. </summary>
  14253. <param name="input">The input byte array.</param>
  14254. <param name="inOff">
  14255. The offset into <c>input</c> where the data to be processed starts.
  14256. </param>
  14257. <param name="length">The number of bytes to be processed.</param>
  14258. <param name="output">The output buffer the processed bytes go into.</param>
  14259. <param name="outOff">
  14260. The offset into <c>output</c> the processed data starts at.
  14261. </param>
  14262. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.DataLengthException">If the input buffer is too small.</exception>
  14263. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.OutputLengthException">If the output buffer is too small.</exception>
  14264. </member>
  14265. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IStreamCipher.ProcessBytes(System.ReadOnlySpan{System.Byte},System.Span{System.Byte})">
  14266. <summary>
  14267. Process a block of bytes from <paramref name="input"/>, putting the result into <paramref name="output"/>.
  14268. </summary>
  14269. <param name="input">The input span.</param>
  14270. <param name="output">The output span.</param>
  14271. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.OutputLengthException">If the output span is too small.</exception>
  14272. </member>
  14273. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IStreamCipher.Reset">
  14274. <summary>
  14275. Reset the cipher to the same state as it was after the last init (if there was one).
  14276. </summary>
  14277. </member>
  14278. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifier">
  14279. <summary>
  14280. Operators that reduce their input to the validation of a signature produce this type.
  14281. </summary>
  14282. </member>
  14283. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifier.IsVerified(System.Byte[])">
  14284. <summary>
  14285. Return true if the passed in data matches what is expected by the verification result.
  14286. </summary>
  14287. <param name="data">The bytes representing the signature.</param>
  14288. <returns>true if the signature verifies, false otherwise.</returns>
  14289. </member>
  14290. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifier.IsVerified(System.Byte[],System.Int32,System.Int32)">
  14291. <summary>
  14292. Return true if the length bytes from off in the source array match the signature
  14293. expected by the verification result.
  14294. </summary>
  14295. <param name="source">Byte array containing the signature.</param>
  14296. <param name="off">The offset into the source array where the signature starts.</param>
  14297. <param name="length">The number of bytes in source making up the signature.</param>
  14298. <returns>true if the signature verifies, false otherwise.</returns>
  14299. </member>
  14300. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifierFactory">
  14301. <summary>
  14302. Base interface for operators that serve as stream-based signature verifiers.
  14303. </summary>
  14304. </member>
  14305. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifierFactory.AlgorithmDetails">
  14306. <summary>The algorithm details object for this verifier.</summary>
  14307. </member>
  14308. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifierFactory.CreateCalculator">
  14309. <summary>
  14310. Create a stream calculator for this verifier. The stream
  14311. calculator is used for the actual operation of entering the data to be verified
  14312. and producing a result which can be used to verify the original signature.
  14313. </summary>
  14314. <returns>A calculator producing an IVerifier which can verify the signature.</returns>
  14315. </member>
  14316. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifierFactoryProvider">
  14317. <summary>
  14318. Base interface for a provider to support the dynamic creation of signature verifiers.
  14319. </summary>
  14320. </member>
  14321. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifierFactoryProvider.CreateVerifierFactory(System.Object)">
  14322. <summary>
  14323. Return a signature verfier for signature algorithm described in the passed in algorithm details object.
  14324. </summary>
  14325. <param name="algorithmDetails">The details of the signature algorithm verification is required for.</param>
  14326. <returns>A new signature verifier.</returns>
  14327. </member>
  14328. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IWrapper.AlgorithmName">
  14329. <summary>The name of the algorithm this cipher implements.</summary>
  14330. </member>
  14331. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IXof">
  14332. <remarks>
  14333. With FIPS PUB 202 a new kind of message digest was announced which supported extendable output, or variable digest sizes.
  14334. This interface provides the extra methods required to support variable output on a digest implementation.
  14335. </remarks>
  14336. </member>
  14337. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IXof.OutputFinal(System.Byte[],System.Int32,System.Int32)">
  14338. <summary>
  14339. Output the results of the final calculation for this XOF to outLen number of bytes.
  14340. </summary>
  14341. <param name="output">output array to write the output bytes to.</param>
  14342. <param name="outOff">offset to start writing the bytes at.</param>
  14343. <param name="outLen">the number of output bytes requested.</param>
  14344. <returns>the number of bytes written</returns>
  14345. </member>
  14346. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IXof.OutputFinal(System.Span{System.Byte})">
  14347. <summary>
  14348. Output the results of the final calculation for this XOF to fill the output span.
  14349. </summary>
  14350. <param name="output">span to fill with the output bytes.</param>
  14351. <returns>the number of bytes written</returns>
  14352. </member>
  14353. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IXof.Output(System.Byte[],System.Int32,System.Int32)">
  14354. <summary>
  14355. Start outputting the results of the final calculation for this XOF. Unlike DoFinal, this method
  14356. will continue producing output until the XOF is explicitly reset, or signals otherwise.
  14357. </summary>
  14358. <param name="output">output array to write the output bytes to.</param>
  14359. <param name="outOff">offset to start writing the bytes at.</param>
  14360. <param name="outLen">the number of output bytes requested.</param>
  14361. <returns>the number of bytes written</returns>
  14362. </member>
  14363. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IXof.Output(System.Span{System.Byte})">
  14364. <summary>
  14365. Start outputting the results of the final calculation for this XOF. Unlike OutputFinal, this method
  14366. will continue producing output until the XOF is explicitly reset, or signals otherwise.
  14367. </summary>
  14368. <param name="output">span to fill with the output bytes.</param>
  14369. <returns>the number of bytes written</returns>
  14370. </member>
  14371. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.KeyGenerationParameters">
  14372. The base class for parameters to key generators.
  14373. </member>
  14374. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.KeyGenerationParameters.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom,System.Int32)">
  14375. initialise the generator with a source of randomness
  14376. and a strength (in bits).
  14377. @param random the random byte source.
  14378. @param strength the size, in bits, of the keys we want to produce.
  14379. </member>
  14380. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.KeyGenerationParameters.Random">
  14381. return the random source associated with this
  14382. generator.
  14383. @return the generators random source.
  14384. </member>
  14385. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.KeyGenerationParameters.Strength">
  14386. return the bit strength for keys produced by this generator,
  14387. @return the strength of the keys this generator produces (in bits).
  14388. </member>
  14389. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac">
  14390. standard CBC Block Cipher MAC - if no padding is specified the default of
  14391. pad of zeroes is used.
  14392. </member>
  14393. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  14394. create a standard MAC based on a CBC block cipher. This will produce an
  14395. authentication code half the length of the block size of the cipher.
  14396. @param cipher the cipher to be used as the basis of the MAC generation.
  14397. </member>
  14398. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  14399. create a standard MAC based on a CBC block cipher. This will produce an
  14400. authentication code half the length of the block size of the cipher.
  14401. @param cipher the cipher to be used as the basis of the MAC generation.
  14402. @param padding the padding to be used to complete the last block.
  14403. </member>
  14404. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  14405. create a standard MAC based on a block cipher with the size of the
  14406. MAC been given in bits. This class uses CBC mode as the basis for the
  14407. MAC generation.
  14408. <p>
  14409. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  14410. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  14411. and in general should be less than the size of the block cipher as it reduces
  14412. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  14413. </p>
  14414. @param cipher the cipher to be used as the basis of the MAC generation.
  14415. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  14416. </member>
  14417. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  14418. create a standard MAC based on a block cipher with the size of the
  14419. MAC been given in bits. This class uses CBC mode as the basis for the
  14420. MAC generation.
  14421. <p>
  14422. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  14423. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  14424. and in general should be less than the size of the block cipher as it reduces
  14425. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  14426. </p>
  14427. @param cipher the cipher to be used as the basis of the MAC generation.
  14428. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  14429. @param padding the padding to be used to complete the last block.
  14430. </member>
  14431. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac.Reset">
  14432. Reset the mac generator.
  14433. </member>
  14434. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.MacCfbBlockCipher">
  14435. implements a Cipher-FeedBack (CFB) mode on top of a simple cipher.
  14436. </member>
  14437. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.MacCfbBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  14438. Basic constructor.
  14439. @param cipher the block cipher to be used as the basis of the
  14440. feedback mode.
  14441. @param blockSize the block size in bits (note: a multiple of 8)
  14442. </member>
  14443. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.MacCfbBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  14444. Initialise the cipher and, possibly, the initialisation vector (IV).
  14445. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  14446. An IV which is too short is handled in FIPS compliant fashion.
  14447. @param param the key and other data required by the cipher.
  14448. @exception ArgumentException if the parameters argument is
  14449. inappropriate.
  14450. </member>
  14451. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.MacCfbBlockCipher.AlgorithmName">
  14452. return the algorithm name and mode.
  14453. @return the name of the underlying algorithm followed by "/CFB"
  14454. and the block size in bits.
  14455. </member>
  14456. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.MacCfbBlockCipher.GetBlockSize">
  14457. return the block size we are operating at.
  14458. @return the block size we are operating at (in bytes).
  14459. </member>
  14460. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.MacCfbBlockCipher.Reset">
  14461. reset the chaining vector back to the IV and reset the underlying
  14462. cipher.
  14463. </member>
  14464. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CfbBlockCipherMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  14465. create a standard MAC based on a CFB block cipher. This will produce an
  14466. authentication code half the length of the block size of the cipher, with
  14467. the CFB mode set to 8 bits.
  14468. @param cipher the cipher to be used as the basis of the MAC generation.
  14469. </member>
  14470. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CfbBlockCipherMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  14471. create a standard MAC based on a CFB block cipher. This will produce an
  14472. authentication code half the length of the block size of the cipher, with
  14473. the CFB mode set to 8 bits.
  14474. @param cipher the cipher to be used as the basis of the MAC generation.
  14475. @param padding the padding to be used.
  14476. </member>
  14477. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CfbBlockCipherMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,System.Int32)">
  14478. create a standard MAC based on a block cipher with the size of the
  14479. MAC been given in bits. This class uses CFB mode as the basis for the
  14480. MAC generation.
  14481. <p>
  14482. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  14483. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  14484. and in general should be less than the size of the block cipher as it reduces
  14485. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  14486. </p>
  14487. @param cipher the cipher to be used as the basis of the MAC generation.
  14488. @param cfbBitSize the size of an output block produced by the CFB mode.
  14489. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  14490. </member>
  14491. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CfbBlockCipherMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  14492. create a standard MAC based on a block cipher with the size of the
  14493. MAC been given in bits. This class uses CFB mode as the basis for the
  14494. MAC generation.
  14495. <p>
  14496. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  14497. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  14498. and in general should be less than the size of the block cipher as it reduces
  14499. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  14500. </p>
  14501. @param cipher the cipher to be used as the basis of the MAC generation.
  14502. @param cfbBitSize the size of an output block produced by the CFB mode.
  14503. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  14504. @param padding a padding to be used.
  14505. </member>
  14506. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CfbBlockCipherMac.Reset">
  14507. Reset the mac generator.
  14508. </member>
  14509. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CMac">
  14510. CMAC - as specified at www.nuee.nagoya-u.ac.jp/labs/tiwata/omac/omac.html
  14511. <p>
  14512. CMAC is analogous to OMAC1 - see also en.wikipedia.org/wiki/CMAC
  14513. </p><p>
  14514. CMAC is a NIST recomendation - see
  14515. csrc.nist.gov/CryptoToolkit/modes/800-38_Series_Publications/SP800-38B.pdf
  14516. </p><p>
  14517. CMAC/OMAC1 is a blockcipher-based message authentication code designed and
  14518. analyzed by Tetsu Iwata and Kaoru Kurosawa.
  14519. </p><p>
  14520. CMAC/OMAC1 is a simple variant of the CBC MAC (Cipher Block Chaining Message
  14521. Authentication Code). OMAC stands for One-Key CBC MAC.
  14522. </p><p>
  14523. It supports 128- or 64-bits block ciphers, with any key size, and returns
  14524. a MAC with dimension less or equal to the block size of the underlying
  14525. cipher.
  14526. </p>
  14527. </member>
  14528. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  14529. create a standard MAC based on a CBC block cipher (64 or 128 bit block).
  14530. This will produce an authentication code the length of the block size
  14531. of the cipher.
  14532. @param cipher the cipher to be used as the basis of the MAC generation.
  14533. </member>
  14534. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  14535. create a standard MAC based on a block cipher with the size of the
  14536. MAC been given in bits.
  14537. <p/>
  14538. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  14539. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  14540. and in general should be less than the size of the block cipher as it reduces
  14541. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  14542. @param cipher the cipher to be used as the basis of the MAC generation.
  14543. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8 and @lt;= 128.
  14544. </member>
  14545. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.CMac.Reset">
  14546. Reset the mac generator.
  14547. </member>
  14548. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Dstu7564Mac">
  14549. <summary>
  14550. Implementation of DSTU7564 mac mode
  14551. </summary>
  14552. </member>
  14553. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Dstu7624Mac">
  14554. implementation of DSTU 7624 MAC
  14555. </member>
  14556. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.GMac">
  14557. <summary>
  14558. The GMAC specialisation of Galois/Counter mode (GCM) detailed in NIST Special Publication
  14559. 800-38D.
  14560. </summary>
  14561. <remarks>
  14562. GMac is an invocation of the GCM mode where no data is encrypted (i.e. all input data to the Mac
  14563. is processed as additional authenticated data with the underlying GCM block cipher).
  14564. </remarks>
  14565. </member>
  14566. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.GMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmBlockCipher)">
  14567. <summary>
  14568. Creates a GMAC based on the operation of a block cipher in GCM mode.
  14569. </summary>
  14570. <remarks>
  14571. This will produce an authentication code the length of the block size of the cipher.
  14572. </remarks>
  14573. <param name="cipher">the cipher to be used in GCM mode to generate the MAC.</param>
  14574. </member>
  14575. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.GMac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmBlockCipher,System.Int32)">
  14576. <summary>
  14577. Creates a GMAC based on the operation of a 128 bit block cipher in GCM mode.
  14578. </summary>
  14579. <remarks>
  14580. This will produce an authentication code the length of the block size of the cipher.
  14581. </remarks>
  14582. <param name="cipher">the cipher to be used in GCM mode to generate the MAC.</param>
  14583. <param name="macSizeBits">the mac size to generate, in bits. Must be a multiple of 8, between 32 and 128 (inclusive).
  14584. Sizes less than 96 are not recommended, but are supported for specialized applications.</param>
  14585. </member>
  14586. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.GMac.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  14587. <summary>
  14588. Initialises the GMAC - requires a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.ParametersWithIV"/>
  14589. providing a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KeyParameter"/> and a nonce.
  14590. </summary>
  14591. </member>
  14592. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Gost28147Mac">
  14593. implementation of GOST 28147-89 MAC
  14594. </member>
  14595. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.HMac">
  14596. HMAC implementation based on RFC2104
  14597. H(K XOR opad, H(K XOR ipad, text))
  14598. </member>
  14599. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.HMac.Reset">
  14600. Reset the mac generator.
  14601. </member>
  14602. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac">
  14603. DES based CBC Block Cipher MAC according to ISO9797, algorithm 3 (ANSI X9.19 Retail MAC)
  14604. This could as well be derived from CBCBlockCipherMac, but then the property mac in the base
  14605. class must be changed to protected
  14606. </member>
  14607. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  14608. create a Retail-MAC based on a CBC block cipher. This will produce an
  14609. authentication code of the length of the block size of the cipher.
  14610. @param cipher the cipher to be used as the basis of the MAC generation. This must
  14611. be DESEngine.
  14612. </member>
  14613. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  14614. create a Retail-MAC based on a CBC block cipher. This will produce an
  14615. authentication code of the length of the block size of the cipher.
  14616. @param cipher the cipher to be used as the basis of the MAC generation.
  14617. @param padding the padding to be used to complete the last block.
  14618. </member>
  14619. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  14620. create a Retail-MAC based on a block cipher with the size of the
  14621. MAC been given in bits. This class uses single DES CBC mode as the basis for the
  14622. MAC generation.
  14623. <p>
  14624. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  14625. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  14626. and in general should be less than the size of the block cipher as it reduces
  14627. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  14628. </p>
  14629. @param cipher the cipher to be used as the basis of the MAC generation.
  14630. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  14631. </member>
  14632. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  14633. create a standard MAC based on a block cipher with the size of the
  14634. MAC been given in bits. This class uses single DES CBC mode as the basis for the
  14635. MAC generation. The final block is decrypted and then encrypted using the
  14636. middle and right part of the key.
  14637. <p>
  14638. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  14639. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  14640. and in general should be less than the size of the block cipher as it reduces
  14641. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  14642. </p>
  14643. @param cipher the cipher to be used as the basis of the MAC generation.
  14644. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  14645. @param padding the padding to be used to complete the last block.
  14646. </member>
  14647. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac.Reset">
  14648. Reset the mac generator.
  14649. </member>
  14650. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305">
  14651. <summary>
  14652. Poly1305 message authentication code, designed by D. J. Bernstein.
  14653. </summary>
  14654. <remarks>
  14655. Poly1305 computes a 128-bit (16 bytes) authenticator, using a 128 bit nonce and a 256 bit key
  14656. consisting of a 128 bit key applied to an underlying cipher, and a 128 bit key (with 106
  14657. effective key bits) used in the authenticator.
  14658. The polynomial calculation in this implementation is adapted from the public domain <a
  14659. href="https://github.com/floodyberry/poly1305-donna">poly1305-donna-unrolled</a> C implementation
  14660. by Andrew M (@floodyberry).
  14661. </remarks>
  14662. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator"/>
  14663. </member>
  14664. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.r0">
  14665. Polynomial key
  14666. </member>
  14667. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.r1">
  14668. Polynomial key
  14669. </member>
  14670. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.r2">
  14671. Polynomial key
  14672. </member>
  14673. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.r3">
  14674. Polynomial key
  14675. </member>
  14676. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.r4">
  14677. Polynomial key
  14678. </member>
  14679. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.s1">
  14680. Precomputed 5 * r[1..4]
  14681. </member>
  14682. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.s2">
  14683. Precomputed 5 * r[1..4]
  14684. </member>
  14685. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.s3">
  14686. Precomputed 5 * r[1..4]
  14687. </member>
  14688. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.s4">
  14689. Precomputed 5 * r[1..4]
  14690. </member>
  14691. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.k0">
  14692. Encrypted nonce
  14693. </member>
  14694. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.k1">
  14695. Encrypted nonce
  14696. </member>
  14697. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.k2">
  14698. Encrypted nonce
  14699. </member>
  14700. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.k3">
  14701. Encrypted nonce
  14702. </member>
  14703. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.currentBlock">
  14704. Current block of buffered input
  14705. </member>
  14706. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.currentBlockOffset">
  14707. Current offset in input buffer
  14708. </member>
  14709. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.h0">
  14710. Polynomial accumulator
  14711. </member>
  14712. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.h1">
  14713. Polynomial accumulator
  14714. </member>
  14715. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.h2">
  14716. Polynomial accumulator
  14717. </member>
  14718. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.h3">
  14719. Polynomial accumulator
  14720. </member>
  14721. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.h4">
  14722. Polynomial accumulator
  14723. </member>
  14724. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.#ctor">
  14725. Constructs a Poly1305 MAC, where the key passed to init() will be used directly.
  14726. </member>
  14727. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  14728. Constructs a Poly1305 MAC, using a 128 bit block cipher.
  14729. </member>
  14730. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.Poly1305.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  14731. <summary>
  14732. Initialises the Poly1305 MAC.
  14733. </summary>
  14734. <param name="parameters">a {@link ParametersWithIV} containing a 128 bit nonce and a {@link KeyParameter} with
  14735. a 256 bit key complying to the {@link Poly1305KeyGenerator Poly1305 key format}.</param>
  14736. </member>
  14737. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SipHash">
  14738. <summary>
  14739. Implementation of SipHash as specified in "SipHash: a fast short-input PRF", by Jean-Philippe
  14740. Aumasson and Daniel J. Bernstein (https://131002.net/siphash/siphash.pdf).
  14741. </summary>
  14742. <remarks>
  14743. "SipHash is a family of PRFs SipHash-c-d where the integer parameters c and d are the number of
  14744. compression rounds and the number of finalization rounds. A compression round is identical to a
  14745. finalization round and this round function is called SipRound. Given a 128-bit key k and a
  14746. (possibly empty) byte string m, SipHash-c-d returns a 64-bit value..."
  14747. </remarks>
  14748. </member>
  14749. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SipHash.#ctor">
  14750. <summary>SipHash-2-4</summary>
  14751. </member>
  14752. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SipHash.#ctor(System.Int32,System.Int32)">
  14753. <summary>SipHash-c-d</summary>
  14754. <param name="c">the number of compression rounds</param>
  14755. <param name="d">the number of finalization rounds</param>
  14756. </member>
  14757. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SkeinMac">
  14758. <summary>
  14759. Implementation of the Skein parameterised MAC function in 256, 512 and 1024 bit block sizes,
  14760. based on the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines.ThreefishEngine">Threefish</see> tweakable block cipher.
  14761. </summary>
  14762. <remarks>
  14763. This is the 1.3 version of Skein defined in the Skein hash function submission to the NIST SHA-3
  14764. competition in October 2010.
  14765. <p/>
  14766. Skein was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir
  14767. Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker.
  14768. </remarks>
  14769. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine"/>
  14770. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/>
  14771. </member>
  14772. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_256">
  14773. <summary>
  14774. 256 bit block size - Skein-256
  14775. </summary>
  14776. </member>
  14777. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_512">
  14778. <summary>
  14779. 512 bit block size - Skein-512
  14780. </summary>
  14781. </member>
  14782. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_1024">
  14783. <summary>
  14784. 1024 bit block size - Skein-1024
  14785. </summary>
  14786. </member>
  14787. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SkeinMac.#ctor(System.Int32,System.Int32)">
  14788. <summary>
  14789. Constructs a Skein MAC with an internal state size and output size.
  14790. </summary>
  14791. <param name="stateSizeBits">the internal state size in bits - one of <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_256"/> <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_512"/> or
  14792. <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_1024"/>.</param>
  14793. <param name="digestSizeBits">the output/MAC size to produce in bits, which must be an integral number of
  14794. bytes.</param>
  14795. </member>
  14796. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SkeinMac.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  14797. <summary>
  14798. Optionally initialises the Skein digest with the provided parameters.
  14799. </summary>
  14800. See <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters"></see> for details on the parameterisation of the Skein hash function.
  14801. <param name="parameters">the parameters to apply to this engine, or <code>null</code> to use no parameters.</param>
  14802. </member>
  14803. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.MaxBytesExceededException">
  14804. <summary>This exception is thrown whenever a cipher requires a change of key, IV or similar after x amount of
  14805. bytes enciphered.
  14806. </summary>
  14807. </member>
  14808. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CbcBlockCipher">
  14809. implements Cipher-Block-Chaining (CBC) mode on top of a simple cipher.
  14810. </member>
  14811. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  14812. Basic constructor.
  14813. @param cipher the block cipher to be used as the basis of chaining.
  14814. </member>
  14815. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.UnderlyingCipher">
  14816. return the underlying block cipher that we are wrapping.
  14817. @return the underlying block cipher that we are wrapping.
  14818. </member>
  14819. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  14820. Initialise the cipher and, possibly, the initialisation vector (IV).
  14821. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  14822. @param forEncryption if true the cipher is initialised for
  14823. encryption, if false for decryption.
  14824. @param param the key and other data required by the cipher.
  14825. @exception ArgumentException if the parameters argument is
  14826. inappropriate.
  14827. </member>
  14828. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.AlgorithmName">
  14829. return the algorithm name and mode.
  14830. @return the name of the underlying algorithm followed by "/CBC".
  14831. </member>
  14832. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.GetBlockSize">
  14833. return the block size of the underlying cipher.
  14834. @return the block size of the underlying cipher.
  14835. </member>
  14836. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.Reset">
  14837. reset the chaining vector back to the IV and reset the underlying
  14838. cipher.
  14839. </member>
  14840. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CcmBlockCipher">
  14841. Implements the Counter with Cipher Block Chaining mode (CCM) detailed in
  14842. NIST Special Publication 800-38C.
  14843. <p>
  14844. <b>Note</b>: this mode is a packet mode - it needs all the data up front.
  14845. </p>
  14846. </member>
  14847. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CcmBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  14848. Basic constructor.
  14849. @param cipher the block cipher to be used.
  14850. </member>
  14851. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CcmBlockCipher.UnderlyingCipher">
  14852. return the underlying block cipher that we are wrapping.
  14853. @return the underlying block cipher that we are wrapping.
  14854. </member>
  14855. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CcmBlockCipher.GetMac">
  14856. Returns a byte array containing the mac calculated as part of the
  14857. last encrypt or decrypt operation.
  14858. @return the last mac calculated.
  14859. </member>
  14860. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CcmBlockCipher.ProcessPacket(System.Byte[],System.Int32,System.Int32)">
  14861. Process a packet of data for either CCM decryption or encryption.
  14862. @param in data for processing.
  14863. @param inOff offset at which data starts in the input array.
  14864. @param inLen length of the data in the input array.
  14865. @return a byte array containing the processed input..
  14866. @throws IllegalStateException if the cipher is not appropriately set up.
  14867. @throws InvalidCipherTextException if the input data is truncated or the mac check fails.
  14868. </member>
  14869. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CcmBlockCipher.ProcessPacket(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  14870. Process a packet of data for either CCM decryption or encryption.
  14871. @param in data for processing.
  14872. @param inOff offset at which data starts in the input array.
  14873. @param inLen length of the data in the input array.
  14874. @param output output array.
  14875. @param outOff offset into output array to start putting processed bytes.
  14876. @return the number of bytes added to output.
  14877. @throws IllegalStateException if the cipher is not appropriately set up.
  14878. @throws InvalidCipherTextException if the input data is truncated or the mac check fails.
  14879. @throws DataLengthException if output buffer too short.
  14880. </member>
  14881. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CfbBlockCipher">
  14882. implements a Cipher-FeedBack (CFB) mode on top of a simple cipher.
  14883. </member>
  14884. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  14885. Basic constructor.
  14886. @param cipher the block cipher to be used as the basis of the
  14887. feedback mode.
  14888. @param blockSize the block size in bits (note: a multiple of 8)
  14889. </member>
  14890. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.UnderlyingCipher">
  14891. return the underlying block cipher that we are wrapping.
  14892. @return the underlying block cipher that we are wrapping.
  14893. </member>
  14894. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  14895. Initialise the cipher and, possibly, the initialisation vector (IV).
  14896. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  14897. An IV which is too short is handled in FIPS compliant fashion.
  14898. @param forEncryption if true the cipher is initialised for
  14899. encryption, if false for decryption.
  14900. @param param the key and other data required by the cipher.
  14901. @exception ArgumentException if the parameters argument is
  14902. inappropriate.
  14903. </member>
  14904. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.AlgorithmName">
  14905. return the algorithm name and mode.
  14906. @return the name of the underlying algorithm followed by "/CFB"
  14907. and the block size in bits.
  14908. </member>
  14909. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.GetBlockSize">
  14910. return the block size we are operating at.
  14911. @return the block size we are operating at (in bytes).
  14912. </member>
  14913. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.Reset">
  14914. reset the chaining vector back to the IV and reset the underlying
  14915. cipher.
  14916. </member>
  14917. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CtsBlockCipher">
  14918. A Cipher Text Stealing (CTS) mode cipher. CTS allows block ciphers to
  14919. be used to produce cipher text which is the same outLength as the plain text.
  14920. </member>
  14921. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IBlockCipherMode)">
  14922. Create a buffered block cipher that uses Cipher Text Stealing
  14923. @param cipher the underlying block cipher this buffering object wraps.
  14924. </member>
  14925. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.GetUpdateOutputSize(System.Int32)">
  14926. return the size of the output buffer required for an update of 'length' bytes.
  14927. @param length the outLength of the input.
  14928. @return the space required to accommodate a call to update
  14929. with length bytes of input.
  14930. </member>
  14931. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.GetOutputSize(System.Int32)">
  14932. return the size of the output buffer required for an update plus a
  14933. doFinal with an input of length bytes.
  14934. @param length the outLength of the input.
  14935. @return the space required to accommodate a call to update and doFinal
  14936. with length bytes of input.
  14937. </member>
  14938. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  14939. process a single byte, producing an output block if necessary.
  14940. @param in the input byte.
  14941. @param out the space for any output that might be produced.
  14942. @param outOff the offset from which the output will be copied.
  14943. @return the number of output bytes copied to out.
  14944. @exception DataLengthException if there isn't enough space in out.
  14945. @exception InvalidOperationException if the cipher isn't initialised.
  14946. </member>
  14947. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  14948. process an array of bytes, producing output if necessary.
  14949. @param in the input byte array.
  14950. @param inOff the offset at which the input data starts.
  14951. @param length the number of bytes to be copied out of the input array.
  14952. @param out the space for any output that might be produced.
  14953. @param outOff the offset from which the output will be copied.
  14954. @return the number of output bytes copied to out.
  14955. @exception DataLengthException if there isn't enough space in out.
  14956. @exception InvalidOperationException if the cipher isn't initialised.
  14957. </member>
  14958. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.DoFinal(System.Byte[],System.Int32)">
  14959. Process the last block in the buffer.
  14960. @param out the array the block currently being held is copied into.
  14961. @param outOff the offset at which the copying starts.
  14962. @return the number of output bytes copied to out.
  14963. @exception DataLengthException if there is insufficient space in out for
  14964. the output.
  14965. @exception InvalidOperationException if the underlying cipher is not
  14966. initialised.
  14967. @exception InvalidCipherTextException if cipher text decrypts wrongly (in
  14968. case the exception will never Get thrown).
  14969. </member>
  14970. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.EaxBlockCipher">
  14971. A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and
  14972. Efficiency - by M. Bellare, P. Rogaway, D. Wagner.
  14973. http://www.cs.ucdavis.edu/~rogaway/papers/eax.pdf
  14974. EAX is an AEAD scheme based on CTR and OMAC1/CMAC, that uses a single block
  14975. cipher to encrypt and authenticate data. It's on-line (the length of a
  14976. message isn't needed to begin processing it), has good performances, it's
  14977. simple and provably secure (provided the underlying block cipher is secure).
  14978. Of course, this implementations is NOT thread-safe.
  14979. </member>
  14980. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.EaxBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  14981. Constructor that accepts an instance of a block cipher engine.
  14982. @param cipher the engine to use
  14983. </member>
  14984. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmBlockCipher">
  14985. <summary>
  14986. Implements the Galois/Counter mode (GCM) detailed in NIST Special Publication 800-38D.
  14987. </summary>
  14988. </member>
  14989. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  14990. <remarks>
  14991. MAC sizes from 32 bits to 128 bits (must be a multiple of 8) are supported. The default is 128 bits.
  14992. Sizes less than 96 are not recommended, but are supported for specialized applications.
  14993. </remarks>
  14994. </member>
  14995. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher">
  14996. GCM-SIV Mode.
  14997. <p>It should be noted that the specified limit of 2<sup>36</sup> bytes is not supported. This is because all bytes are
  14998. cached in a <b>ByteArrayOutputStream</b> object (which has a limit of a little less than 2<sup>31</sup> bytes),
  14999. and are output on the <b>DoFinal</b>() call (which can only process a maximum of 2<sup>31</sup> bytes).</p>
  15000. <p>The practical limit of 2<sup>31</sup> - 24 bytes is policed, and attempts to breach the limit will be rejected</p>
  15001. <p>In order to properly support the higher limit, an extended form of <b>ByteArrayOutputStream</b> would be needed
  15002. which would use multiple arrays to store the data. In addition, a new <b>doOutput</b> method would be required (similar
  15003. to that in <b>XOF</b> digests), which would allow the data to be output over multiple calls. Alternatively an extended
  15004. form of <b>ByteArrayInputStream</b> could be used to deliver the data.</p>
  15005. </member>
  15006. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.BUFLEN">
  15007. <summary>The buffer length.</summary>
  15008. </member>
  15009. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.HALFBUFLEN">
  15010. <summary>The halfBuffer length.</summary>
  15011. </member>
  15012. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.NONCELEN">
  15013. <summary>The nonce length.</summary>
  15014. </member>
  15015. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.MAX_DATALEN">
  15016. The maximum data length (AEAD/PlainText). Due to implementation constraints this is restricted to the maximum
  15017. array length (https://programming.guide/java/array-maximum-length.html) minus the BUFLEN to allow for the MAC
  15018. </member>
  15019. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.MASK">
  15020. The top bit mask.
  15021. </member>
  15022. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.ADD">
  15023. The addition constant.
  15024. </member>
  15025. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.INIT">
  15026. The initialisation flag.
  15027. </member>
  15028. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.AEAD_COMPLETE">
  15029. The aeadComplete flag.
  15030. </member>
  15031. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theCipher">
  15032. The cipher.
  15033. </member>
  15034. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theMultiplier">
  15035. The multiplier.
  15036. </member>
  15037. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theGHash">
  15038. The gHash buffer.
  15039. </member>
  15040. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theReverse">
  15041. The reverse buffer.
  15042. </member>
  15043. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theAEADHasher">
  15044. The aeadHasher.
  15045. </member>
  15046. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theDataHasher">
  15047. The dataHasher.
  15048. </member>
  15049. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.thePlain">
  15050. The plainDataStream.
  15051. </member>
  15052. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theEncData">
  15053. The encryptedDataStream (decryption only).
  15054. </member>
  15055. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.forEncryption">
  15056. Are we encrypting?
  15057. </member>
  15058. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theInitialAEAD">
  15059. The initialAEAD.
  15060. </member>
  15061. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theNonce">
  15062. The nonce.
  15063. </member>
  15064. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theFlags">
  15065. The flags.
  15066. </member>
  15067. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.#ctor">
  15068. Constructor.
  15069. </member>
  15070. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  15071. Constructor.
  15072. @param pCipher the underlying cipher
  15073. </member>
  15074. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm.IGcmMultiplier)">
  15075. Constructor.
  15076. @param pCipher the underlying cipher
  15077. @param pMultiplier the multiplier
  15078. </member>
  15079. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.CheckAeadStatus(System.Int32)">
  15080. check AEAD status.
  15081. @param pLen the aeadLength
  15082. </member>
  15083. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.CheckStatus(System.Int32)">
  15084. check status.
  15085. @param pLen the dataLength
  15086. </member>
  15087. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.ResetStreams">
  15088. Reset Streams.
  15089. </member>
  15090. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.bufLength(System.Byte[])">
  15091. Obtain buffer length (allowing for null).
  15092. @param pBuffer the buffere
  15093. @return the length
  15094. </member>
  15095. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.CalculateTag">
  15096. calculate tag.
  15097. @return the calculated tag
  15098. </member>
  15099. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.completePolyVal">
  15100. complete polyVAL.
  15101. @return the calculated value
  15102. </member>
  15103. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.gHashLengths">
  15104. process lengths.
  15105. </member>
  15106. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.gHASH(System.Byte[])">
  15107. perform the next GHASH step.
  15108. @param pNext the next value
  15109. </member>
  15110. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.xorBlock(System.Byte[],System.Byte[])">
  15111. xor a full block buffer.
  15112. @param pLeft the left operand and result
  15113. @param pRight the right operand
  15114. </member>
  15115. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.xorBlock(System.Byte[],System.Byte[],System.Int32,System.Int32)">
  15116. xor a partial block buffer.
  15117. @param pLeft the left operand and result
  15118. @param pRight the right operand
  15119. @param pOffset the offset in the right operand
  15120. @param pLength the length of data in the right operand
  15121. </member>
  15122. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.incrementCounter(System.Byte[])">
  15123. increment the counter.
  15124. @param pCounter the counter to increment
  15125. </member>
  15126. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.mulX(System.Byte[])">
  15127. multiply by X.
  15128. @param pValue the value to adjust
  15129. </member>
  15130. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.DeriveKeys(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KeyParameter)">
  15131. Derive Keys.
  15132. @param pKey the keyGeneration key
  15133. </member>
  15134. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher">
  15135. Hash Control.
  15136. </member>
  15137. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.theBuffer">
  15138. Cache.
  15139. </member>
  15140. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.theByte">
  15141. Single byte cache.
  15142. </member>
  15143. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.numActive">
  15144. Count of active bytes in cache.
  15145. </member>
  15146. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.numHashed">
  15147. Count of hashed bytes.
  15148. </member>
  15149. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.getBytesProcessed">
  15150. Obtain the count of bytes hashed.
  15151. @return the count
  15152. </member>
  15153. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.Reset">
  15154. Reset the hasher.
  15155. </member>
  15156. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.UpdateHash(System.Byte)">
  15157. update hash.
  15158. @param pByte the byte
  15159. </member>
  15160. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.UpdateHash(System.Byte[],System.Int32,System.Int32)">
  15161. update hash.
  15162. @param pBuffer the buffer
  15163. @param pOffset the offset within the buffer
  15164. @param pLen the length of data
  15165. </member>
  15166. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.completeHash">
  15167. complete hash.
  15168. </member>
  15169. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher">
  15170. implements the GOST 28147 OFB counter mode (GCTR).
  15171. </member>
  15172. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  15173. Basic constructor.
  15174. @param cipher the block cipher to be used as the basis of the
  15175. counter mode (must have a 64 bit block size).
  15176. </member>
  15177. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.UnderlyingCipher">
  15178. return the underlying block cipher that we are wrapping.
  15179. @return the underlying block cipher that we are wrapping.
  15180. </member>
  15181. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  15182. Initialise the cipher and, possibly, the initialisation vector (IV).
  15183. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  15184. An IV which is too short is handled in FIPS compliant fashion.
  15185. @param encrypting if true the cipher is initialised for
  15186. encryption, if false for decryption.
  15187. @param parameters the key and other data required by the cipher.
  15188. @exception ArgumentException if the parameters argument is inappropriate.
  15189. </member>
  15190. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.AlgorithmName">
  15191. return the algorithm name and mode.
  15192. @return the name of the underlying algorithm followed by "/GCTR"
  15193. and the block size in bits
  15194. </member>
  15195. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.GetBlockSize">
  15196. return the block size we are operating at (in bytes).
  15197. @return the block size we are operating at (in bytes).
  15198. </member>
  15199. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.Reset">
  15200. reset the feedback vector back to the IV and reset the underlying
  15201. cipher.
  15202. </member>
  15203. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadBlockCipher">
  15204. <summary>An IAeadCipher based on an IBlockCipher.</summary>
  15205. </member>
  15206. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadBlockCipher.GetBlockSize">
  15207. <returns>The block size for this cipher, in bytes.</returns>
  15208. </member>
  15209. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadBlockCipher.UnderlyingCipher">
  15210. <summary>The block cipher underlying this algorithm.</summary>
  15211. </member>
  15212. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher">
  15213. <summary>
  15214. A cipher mode that includes authenticated encryption with a streaming mode and optional
  15215. associated data.
  15216. </summary>
  15217. <remarks>
  15218. Implementations of this interface may operate in a packet mode (where all input data is
  15219. buffered and processed during the call to DoFinal, or in a streaming mode (where output
  15220. data is incrementally produced with each call to ProcessByte or ProcessBytes. This is
  15221. important to consider during decryption: in a streaming mode, unauthenticated plaintext
  15222. data may be output prior to the call to DoFinal that results in an authentication failure.
  15223. The higher level protocol utilising this cipher must ensure the plaintext data is handled
  15224. appropriately until the end of data is reached and the entire ciphertext is authenticated.
  15225. </remarks>
  15226. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.AeadParameters"/>
  15227. </member>
  15228. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.AlgorithmName">
  15229. <summary>The name of the algorithm this cipher implements.</summary>
  15230. </member>
  15231. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  15232. <summary>Initialise the cipher.</summary>
  15233. <remarks>Parameter can either be an AeadParameters or a ParametersWithIV object.</remarks>
  15234. <param name="forEncryption">Initialise for encryption if true, for decryption if false.</param>
  15235. <param name="parameters">The key or other data required by the cipher.</param>
  15236. </member>
  15237. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.ProcessAadByte(System.Byte)">
  15238. <summary>Add a single byte to the associated data check.</summary>
  15239. <remarks>If the implementation supports it, this will be an online operation and will not retain the associated data.</remarks>
  15240. <param name="input">The byte to be processed.</param>
  15241. </member>
  15242. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.ProcessAadBytes(System.Byte[],System.Int32,System.Int32)">
  15243. <summary>Add a sequence of bytes to the associated data check.</summary>
  15244. <remarks>If the implementation supports it, this will be an online operation and will not retain the associated data.</remarks>
  15245. <param name="inBytes">The input byte array.</param>
  15246. <param name="inOff">The offset into the input array where the data to be processed starts.</param>
  15247. <param name="len">The number of bytes to be processed.</param>
  15248. </member>
  15249. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.ProcessAadBytes(System.ReadOnlySpan{System.Byte})">
  15250. <summary>Add a span of bytes to the associated data check.</summary>
  15251. <remarks>If the implementation supports it, this will be an online operation and will not retain the associated data.</remarks>
  15252. <param name="input">the span containing the data.</param>
  15253. </member>
  15254. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  15255. Encrypt/decrypt a single byte.
  15256. @param input the byte to be processed.
  15257. @param outBytes the output buffer the processed byte goes into.
  15258. @param outOff the offset into the output byte array the processed data starts at.
  15259. @return the number of bytes written to out.
  15260. @exception DataLengthException if the output buffer is too small.
  15261. </member>
  15262. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  15263. Process a block of bytes from in putting the result into out.
  15264. @param inBytes the input byte array.
  15265. @param inOff the offset into the in array where the data to be processed starts.
  15266. @param len the number of bytes to be processed.
  15267. @param outBytes the output buffer the processed bytes go into.
  15268. @param outOff the offset into the output byte array the processed data starts at.
  15269. @return the number of bytes written to out.
  15270. @exception DataLengthException if the output buffer is too small.
  15271. </member>
  15272. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.DoFinal(System.Byte[],System.Int32)">
  15273. Finish the operation either appending or verifying the MAC at the end of the data.
  15274. @param outBytes space for any resulting output data.
  15275. @param outOff offset into out to start copying the data at.
  15276. @return number of bytes written into out.
  15277. @throws InvalidOperationException if the cipher is in an inappropriate state.
  15278. @throws InvalidCipherTextException if the MAC fails to match.
  15279. </member>
  15280. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.GetMac">
  15281. Return the value of the MAC associated with the last stream processed.
  15282. @return MAC for plaintext data.
  15283. </member>
  15284. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.GetUpdateOutputSize(System.Int32)">
  15285. Return the size of the output buffer required for a ProcessBytes
  15286. an input of len bytes.
  15287. @param len the length of the input.
  15288. @return the space required to accommodate a call to ProcessBytes
  15289. with len bytes of input.
  15290. </member>
  15291. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.GetOutputSize(System.Int32)">
  15292. Return the size of the output buffer required for a ProcessBytes plus a
  15293. DoFinal with an input of len bytes.
  15294. @param len the length of the input.
  15295. @return the space required to accommodate a call to ProcessBytes and DoFinal
  15296. with len bytes of input.
  15297. </member>
  15298. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IAeadCipher.Reset">
  15299. <summary>
  15300. Reset the cipher to the same state as it was after the last init (if there was one).
  15301. </summary>
  15302. </member>
  15303. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IBlockCipherMode.UnderlyingCipher">
  15304. <summary>Return the <code cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher"/> underlying this cipher mode.</summary>
  15305. </member>
  15306. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IBlockCipherMode.IsPartialBlockOkay">
  15307. <summary>Indicates whether this cipher mode can handle partial blocks.</summary>
  15308. </member>
  15309. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IBlockCipherMode.Reset">
  15310. <summary>
  15311. Reset the cipher mode to the same state as it was after the last init (if there was one).
  15312. </summary>
  15313. </member>
  15314. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.KCcmBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  15315. <summary>
  15316. Base constructor. Nb value is set to 4.
  15317. </summary>
  15318. <param name="engine">base cipher to use under CCM.</param>
  15319. </member>
  15320. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.KCcmBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  15321. <summary>
  15322. Constructor allowing Nb configuration.
  15323. Nb is a parameter specified in CCM mode of DSTU7624 standard.
  15324. This parameter specifies maximum possible length of input.It should
  15325. be calculated as follows: Nb = 1 / 8 * (-3 + log[2]Nmax) + 1,
  15326. where Nmax - length of input message in bits.For practical reasons
  15327. Nmax usually less than 4Gb, e.g. for Nmax = 2^32 - 1, Nb = 4.
  15328. </summary>
  15329. <param name="engine">base cipher to use under CCM.</param>
  15330. <param name="Nb">Nb value to use.</param>
  15331. </member>
  15332. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher">
  15333. Implements a Gamming or Counter (CTR) mode on top of a DSTU 7624 block cipher.
  15334. </member>
  15335. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  15336. Basic constructor.
  15337. @param cipher the block cipher to be used as the basis of the
  15338. feedback mode.
  15339. </member>
  15340. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.UnderlyingCipher">
  15341. return the underlying block cipher that we are wrapping.
  15342. @return the underlying block cipher that we are wrapping.
  15343. </member>
  15344. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  15345. Initialise the cipher and, possibly, the initialisation vector (IV).
  15346. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  15347. An IV which is too short is handled in FIPS compliant fashion.
  15348. @param forEncryption if true the cipher is initialised for
  15349. encryption, if false for decryption.
  15350. @param param the key and other data required by the cipher.
  15351. @exception ArgumentException if the parameters argument is
  15352. inappropriate.
  15353. </member>
  15354. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.AlgorithmName">
  15355. return the algorithm name and mode.
  15356. @return the name of the underlying algorithm followed by "/KCTR"
  15357. and the block size in bits.
  15358. </member>
  15359. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.GetBlockSize">
  15360. return the block size we are operating at.
  15361. @return the block size we are operating at (in bytes).
  15362. </member>
  15363. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  15364. Process one block of input from the array in and write it to
  15365. the out array.
  15366. @param input the array containing the input data.
  15367. @param inOff offset into the in array the data starts at.
  15368. @param output the array the output data will be copied into.
  15369. @param outOff the offset into the out array the output will start at.
  15370. @exception DataLengthException if there isn't enough data in in, or
  15371. space in out.
  15372. @exception InvalidOperationException if the cipher isn't initialised.
  15373. @return the number of bytes processed and produced.
  15374. </member>
  15375. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.Reset">
  15376. reset the chaining vector back to the IV and reset the underlying
  15377. cipher.
  15378. </member>
  15379. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OcbBlockCipher">
  15380. <summary>An implementation of <a href="https://tools.ietf.org/html/rfc7253">RFC 7253 on The OCB
  15381. Authenticated-Encryption Algorithm</a>.</summary>
  15382. <remarks>
  15383. For those still concerned about the original patents around this, please see:
  15384. <para>https://mailarchive.ietf.org/arch/msg/cfrg/qLTveWOdTJcLn4HP3ev-vrj05Vg/</para>
  15385. Text reproduced below:
  15386. <para>
  15387. Phillip Rogaway&lt;rogaway@cs.ucdavis.edu&gt; Sat, 27 February 2021 02:46 UTC
  15388. I can confirm that I have abandoned all OCB patents and placed into the public domain all OCB-related IP of
  15389. mine. While I have been telling people this for quite some time, I don't think I ever made a proper announcement
  15390. to the CFRG or on the OCB webpage. Consider that done.
  15391. </para>
  15392. </remarks>
  15393. </member>
  15394. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OfbBlockCipher">
  15395. implements a Output-FeedBack (OFB) mode on top of a simple cipher.
  15396. </member>
  15397. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  15398. Basic constructor.
  15399. @param cipher the block cipher to be used as the basis of the
  15400. feedback mode.
  15401. @param blockSize the block size in bits (note: a multiple of 8)
  15402. </member>
  15403. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.UnderlyingCipher">
  15404. return the underlying block cipher that we are wrapping.
  15405. @return the underlying block cipher that we are wrapping.
  15406. </member>
  15407. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  15408. Initialise the cipher and, possibly, the initialisation vector (IV).
  15409. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  15410. An IV which is too short is handled in FIPS compliant fashion.
  15411. @param forEncryption if true the cipher is initialised for
  15412. encryption, if false for decryption.
  15413. @param param the key and other data required by the cipher.
  15414. @exception ArgumentException if the parameters argument is
  15415. inappropriate.
  15416. </member>
  15417. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.AlgorithmName">
  15418. return the algorithm name and mode.
  15419. @return the name of the underlying algorithm followed by "/OFB"
  15420. and the block size in bits
  15421. </member>
  15422. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.GetBlockSize">
  15423. return the block size we are operating at (in bytes).
  15424. @return the block size we are operating at (in bytes).
  15425. </member>
  15426. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.Reset">
  15427. reset the feedback vector back to the IV and reset the underlying
  15428. cipher.
  15429. </member>
  15430. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher">
  15431. * Implements OpenPGP's rather strange version of Cipher-FeedBack (CFB) mode
  15432. * on top of a simple cipher. This class assumes the IV has been prepended
  15433. * to the data stream already, and just accomodates the reset after
  15434. * (blockSize + 2) bytes have been read.
  15435. * <p>
  15436. * For further info see <a href="http://www.ietf.org/rfc/rfc2440.html">RFC 2440</a>.
  15437. * </p>
  15438. </member>
  15439. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  15440. Basic constructor.
  15441. @param cipher the block cipher to be used as the basis of the
  15442. feedback mode.
  15443. </member>
  15444. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.UnderlyingCipher">
  15445. return the underlying block cipher that we are wrapping.
  15446. @return the underlying block cipher that we are wrapping.
  15447. </member>
  15448. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.AlgorithmName">
  15449. return the algorithm name and mode.
  15450. @return the name of the underlying algorithm followed by "/PGPCFB"
  15451. and the block size in bits.
  15452. </member>
  15453. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.GetBlockSize">
  15454. return the block size we are operating at.
  15455. @return the block size we are operating at (in bytes).
  15456. </member>
  15457. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.Reset">
  15458. reset the chaining vector back to the IV and reset the underlying
  15459. cipher.
  15460. </member>
  15461. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  15462. Initialise the cipher and, possibly, the initialisation vector (IV).
  15463. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  15464. An IV which is too short is handled in FIPS compliant fashion.
  15465. @param forEncryption if true the cipher is initialised for
  15466. encryption, if false for decryption.
  15467. @param parameters the key and other data required by the cipher.
  15468. @exception ArgumentException if the parameters argument is
  15469. inappropriate.
  15470. </member>
  15471. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.EncryptByte(System.Byte,System.Int32)">
  15472. Encrypt one byte of data according to CFB mode.
  15473. @param data the byte to encrypt
  15474. @param blockOff offset in the current block
  15475. @returns the encrypted byte
  15476. </member>
  15477. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.SicBlockCipher">
  15478. Implements the Segmented Integer Counter (SIC) mode on top of a simple
  15479. block cipher.
  15480. </member>
  15481. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.SicBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  15482. Basic constructor.
  15483. @param c the block cipher to be used.
  15484. </member>
  15485. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.SicBlockCipher.UnderlyingCipher">
  15486. return the underlying block cipher that we are wrapping.
  15487. @return the underlying block cipher that we are wrapping.
  15488. </member>
  15489. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators.X509Utilities.GetDigestAlgName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  15490. Return the digest algorithm using one of the standard JCA string
  15491. representations rather than the algorithm identifier (if possible).
  15492. </member>
  15493. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators.Asn1SignatureFactory">
  15494. <summary>
  15495. Calculator factory class for signature generation in ASN.1 based profiles that use an AlgorithmIdentifier to preserve
  15496. signature algorithm details.
  15497. </summary>
  15498. </member>
  15499. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators.Asn1SignatureFactory.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  15500. <summary>
  15501. Base constructor.
  15502. </summary>
  15503. <param name="algorithm">The name of the signature algorithm to use.</param>
  15504. <param name="privateKey">The private key to be used in the signing operation.</param>
  15505. </member>
  15506. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators.Asn1SignatureFactory.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  15507. <summary>
  15508. Constructor which also specifies a source of randomness to be used if one is required.
  15509. </summary>
  15510. <param name="algorithm">The name of the signature algorithm to use.</param>
  15511. <param name="privateKey">The private key to be used in the signing operation.</param>
  15512. <param name="random">The source of randomness to be used in signature calculation.</param>
  15513. </member>
  15514. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators.Asn1SignatureFactory.SignatureAlgNames">
  15515. <summary>
  15516. Allows enumeration of the signature names supported by the verifier provider.
  15517. </summary>
  15518. </member>
  15519. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators.Asn1VerifierFactory">
  15520. <summary>
  15521. Verifier class for signature verification in ASN.1 based profiles that use an AlgorithmIdentifier to preserve
  15522. signature algorithm details.
  15523. </summary>
  15524. </member>
  15525. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators.Asn1VerifierFactory.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  15526. <summary>
  15527. Base constructor.
  15528. </summary>
  15529. <param name="algorithm">The name of the signature algorithm to use.</param>
  15530. <param name="publicKey">The public key to be used in the verification operation.</param>
  15531. </member>
  15532. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators.Asn1VerifierFactoryProvider">
  15533. <summary>
  15534. Provider class which supports dynamic creation of signature verifiers.
  15535. </summary>
  15536. </member>
  15537. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators.Asn1VerifierFactoryProvider.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  15538. <summary>
  15539. Base constructor - specify the public key to be used in verification.
  15540. </summary>
  15541. <param name="publicKey">The public key to be used in creating verifiers provided by this object.</param>
  15542. </member>
  15543. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators.Asn1VerifierFactoryProvider.SignatureAlgNames">
  15544. <summary>
  15545. Allows enumeration of the signature names supported by the verifier provider.
  15546. </summary>
  15547. </member>
  15548. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding">
  15549. <summary>Block cipher padders are expected to conform to this interface.</summary>
  15550. </member>
  15551. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  15552. <summary>Initialise the padder.</summary>
  15553. <param name="random">A source of randomness, if any required.</param>
  15554. </member>
  15555. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding.PaddingName">
  15556. <summary>The name of the algorithm this padder implements.</summary>
  15557. </member>
  15558. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding.AddPadding(System.Byte[],System.Int32)">
  15559. <summary>Add padding to the passed in block.</summary>
  15560. <param name="input">the block to add padding to.</param>
  15561. <param name="inOff">the offset into the block the padding is to start at.</param>
  15562. <returns>the number of bytes of padding added.</returns>
  15563. </member>
  15564. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding.AddPadding(System.Span{System.Byte},System.Int32)">
  15565. <summary>Add padding to the passed in block.</summary>
  15566. <param name="block">the block to add padding to.</param>
  15567. <param name="position">the offset into the block the padding is to start at.</param>
  15568. <returns>the number of bytes of padding added.</returns>
  15569. </member>
  15570. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding.PadCount(System.Byte[])">
  15571. <summary>Determine the length of padding present in the passed in block.</summary>
  15572. <param name="input">the block to check padding for.</param>
  15573. <returns>the number of bytes of padding present.</returns>
  15574. </member>
  15575. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding.PadCount(System.ReadOnlySpan{System.Byte})">
  15576. <summary>Determine the length of padding present in the passed in block.</summary>
  15577. <param name="block">the block to check padding for.</param>
  15578. <returns>the number of bytes of padding present.</returns>
  15579. </member>
  15580. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.ISO10126d2Padding">
  15581. A padder that adds ISO10126-2 padding to a block.
  15582. </member>
  15583. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.ISO10126d2Padding.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  15584. Initialise the padder.
  15585. @param random a SecureRandom if available.
  15586. </member>
  15587. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.ISO10126d2Padding.PaddingName">
  15588. Return the name of the algorithm the cipher implements.
  15589. @return the name of the algorithm the cipher implements.
  15590. </member>
  15591. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.ISO7816d4Padding">
  15592. A padder that adds the padding according to the scheme referenced in
  15593. ISO 7814-4 - scheme 2 from ISO 9797-1. The first byte is 0x80, rest is 0x00
  15594. </member>
  15595. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.ISO7816d4Padding.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  15596. Initialise the padder.
  15597. @param random - a SecureRandom if available.
  15598. </member>
  15599. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.ISO7816d4Padding.PaddingName">
  15600. Return the name of the algorithm the padder implements.
  15601. @return the name of the algorithm the padder implements.
  15602. </member>
  15603. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher">
  15604. A wrapper class that allows block ciphers to be used to process data in
  15605. a piecemeal fashion with padding. The PaddedBufferedBlockCipher
  15606. outputs a block only when the buffer is full and more data is being added,
  15607. or on a doFinal (unless the current block in the buffer is a pad block).
  15608. The default padding mechanism used is the one outlined in Pkcs5/Pkcs7.
  15609. </member>
  15610. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IBlockCipherMode,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  15611. Create a buffered block cipher with the desired padding.
  15612. @param cipher the underlying block cipher this buffering object wraps.
  15613. @param padding the padding type.
  15614. </member>
  15615. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IBlockCipherMode)">
  15616. Create a buffered block cipher Pkcs7 padding
  15617. @param cipher the underlying block cipher this buffering object wraps.
  15618. </member>
  15619. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  15620. initialise the cipher.
  15621. @param forEncryption if true the cipher is initialised for
  15622. encryption, if false for decryption.
  15623. @param param the key and other data required by the cipher.
  15624. @exception ArgumentException if the parameters argument is
  15625. inappropriate.
  15626. </member>
  15627. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.GetOutputSize(System.Int32)">
  15628. return the minimum size of the output buffer required for an update
  15629. plus a doFinal with an input of len bytes.
  15630. @param len the length of the input.
  15631. @return the space required to accommodate a call to update and doFinal
  15632. with len bytes of input.
  15633. </member>
  15634. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.GetUpdateOutputSize(System.Int32)">
  15635. return the size of the output buffer required for an update
  15636. an input of len bytes.
  15637. @param len the length of the input.
  15638. @return the space required to accommodate a call to update
  15639. with len bytes of input.
  15640. </member>
  15641. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  15642. process a single byte, producing an output block if necessary.
  15643. @param in the input byte.
  15644. @param out the space for any output that might be produced.
  15645. @param outOff the offset from which the output will be copied.
  15646. @return the number of output bytes copied to out.
  15647. @exception DataLengthException if there isn't enough space in out.
  15648. @exception InvalidOperationException if the cipher isn't initialised.
  15649. </member>
  15650. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  15651. process an array of bytes, producing output if necessary.
  15652. @param in the input byte array.
  15653. @param inOff the offset at which the input data starts.
  15654. @param len the number of bytes to be copied out of the input array.
  15655. @param out the space for any output that might be produced.
  15656. @param outOff the offset from which the output will be copied.
  15657. @return the number of output bytes copied to out.
  15658. @exception DataLengthException if there isn't enough space in out.
  15659. @exception InvalidOperationException if the cipher isn't initialised.
  15660. </member>
  15661. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.DoFinal(System.Byte[],System.Int32)">
  15662. Process the last block in the buffer. If the buffer is currently
  15663. full and padding needs to be added a call to doFinal will produce
  15664. 2 * GetBlockSize() bytes.
  15665. @param out the array the block currently being held is copied into.
  15666. @param outOff the offset at which the copying starts.
  15667. @return the number of output bytes copied to out.
  15668. @exception DataLengthException if there is insufficient space in out for
  15669. the output or we are decrypting and the input is not block size aligned.
  15670. @exception InvalidOperationException if the underlying cipher is not
  15671. initialised.
  15672. @exception InvalidCipherTextException if padding is expected and not found.
  15673. </member>
  15674. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.Pkcs7Padding">
  15675. A padder that adds Pkcs7/Pkcs5 padding to a block.
  15676. </member>
  15677. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.Pkcs7Padding.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  15678. Initialise the padder.
  15679. @param random - a SecureRandom if available.
  15680. </member>
  15681. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.Pkcs7Padding.PaddingName">
  15682. Return the name of the algorithm the cipher implements.
  15683. @return the name of the algorithm the cipher implements.
  15684. </member>
  15685. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.TbcPadding">
  15686. <summary> A padder that adds Trailing-Bit-Compliment padding to a block.
  15687. <p>
  15688. This padding pads the block out compliment of the last bit
  15689. of the plain text.
  15690. </p>
  15691. </summary>
  15692. </member>
  15693. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.TbcPadding.PaddingName">
  15694. <summary> Return the name of the algorithm the cipher implements.</summary>
  15695. <returns> the name of the algorithm the cipher implements.
  15696. </returns>
  15697. </member>
  15698. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.TbcPadding.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  15699. <summary> Initialise the padder.</summary>
  15700. <param name="random">- a SecureRandom if available.
  15701. </param>
  15702. </member>
  15703. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.TbcPadding.AddPadding(System.Byte[],System.Int32)">
  15704. <summary> add the pad bytes to the passed in block, returning the number of bytes added.</summary>
  15705. <remarks>
  15706. This assumes that the last block of plain text is always passed to it inside <paramref name="input"/>.
  15707. i.e. if <paramref name="inOff"/> is zero, indicating the padding will fill the entire block,the value of
  15708. <paramref name="input"/> should be the same as the last block of plain text.
  15709. </remarks>
  15710. </member>
  15711. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.TbcPadding.AddPadding(System.Span{System.Byte},System.Int32)">
  15712. <summary> add the pad bytes to the passed in block, returning the number of bytes added.</summary>
  15713. <remarks>
  15714. This assumes that the last block of plain text is always passed to it inside <paramref name="block"/>.
  15715. i.e. if <paramref name="position"/> is zero, indicating the padding will fill the entire block,the value of
  15716. <paramref name="block"/> should be the same as the last block of plain text.
  15717. </remarks>
  15718. </member>
  15719. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.X923Padding">
  15720. A padder that adds X9.23 padding to a block - if a SecureRandom is
  15721. passed in random padding is assumed, otherwise padding with zeros is used.
  15722. </member>
  15723. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.X923Padding.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  15724. Initialise the padder.
  15725. @param random a SecureRandom if one is available.
  15726. </member>
  15727. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.X923Padding.PaddingName">
  15728. Return the name of the algorithm the cipher implements.
  15729. @return the name of the algorithm the cipher implements.
  15730. </member>
  15731. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.ZeroBytePadding">
  15732. <summary> A padder that adds Null byte padding to a block.</summary>
  15733. </member>
  15734. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.ZeroBytePadding.PaddingName">
  15735. <summary> Return the name of the algorithm the cipher implements.
  15736. </summary>
  15737. <returns> the name of the algorithm the cipher implements.
  15738. </returns>
  15739. </member>
  15740. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings.ZeroBytePadding.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  15741. <summary> Initialise the padder.
  15742. </summary>
  15743. <param name="random">- a SecureRandom if available.
  15744. </param>
  15745. </member>
  15746. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.AeadParameters.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KeyParameter,System.Int32,System.Byte[])">
  15747. Base constructor.
  15748. @param key key to be used by underlying cipher
  15749. @param macSize macSize in bits
  15750. @param nonce nonce to be used
  15751. </member>
  15752. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.AeadParameters.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KeyParameter,System.Int32,System.Byte[],System.Byte[])">
  15753. Base constructor.
  15754. @param key key to be used by underlying cipher
  15755. @param macSize macSize in bits
  15756. @param nonce nonce to be used
  15757. @param associatedText associated text, if any
  15758. </member>
  15759. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.Blake3Parameters">
  15760. <summary>Blake3 Parameters.</summary>
  15761. </member>
  15762. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.Blake3Parameters.Context(System.Byte[])">
  15763. <summary>Create a key parameter.</summary>
  15764. <param name="pContext">the context</param>
  15765. <returns>the parameter</returns>
  15766. </member>
  15767. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.Blake3Parameters.Key(System.Byte[])">
  15768. <summary>Create a key parameter.</summary>
  15769. <param name="pKey">the key</param>
  15770. <returns>the parameter</returns>
  15771. </member>
  15772. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.Blake3Parameters.GetKey">
  15773. <summary>Obtain the key.</summary>
  15774. <returns>the key</returns>
  15775. </member>
  15776. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.Blake3Parameters.ClearKey">
  15777. <summary>Clear the key bytes.</summary>
  15778. </member>
  15779. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.Blake3Parameters.GetContext">
  15780. <summary>Obtain the salt.</summary>
  15781. <returns>the salt</returns>
  15782. </member>
  15783. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DesEdeParameters.IsWeakKey(System.Byte[],System.Int32,System.Int32)">
  15784. return true if the passed in key is a DES-EDE weak key.
  15785. @param key bytes making up the key
  15786. @param offset offset into the byte array the key starts at
  15787. @param length number of bytes making up the key
  15788. </member>
  15789. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DesEdeParameters.IsWeakKey(System.Byte[],System.Int32)">
  15790. return true if the passed in key is a DES-EDE weak key.
  15791. @param key bytes making up the key
  15792. @param offset offset into the byte array the key starts at
  15793. </member>
  15794. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DesEdeParameters.IsRealEdeKey(System.Byte[],System.Int32)">
  15795. return true if the passed in key is a real 2/3 part DES-EDE key.
  15796. @param key bytes making up the key
  15797. @param offset offset into the byte array the key starts at
  15798. </member>
  15799. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DesEdeParameters.IsReal2Key(System.Byte[],System.Int32)">
  15800. return true if the passed in key is a real 2 part DES-EDE key.
  15801. @param key bytes making up the key
  15802. @param offset offset into the byte array the key starts at
  15803. </member>
  15804. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DesEdeParameters.IsReal3Key(System.Byte[],System.Int32)">
  15805. return true if the passed in key is a real 3 part DES-EDE key.
  15806. @param key bytes making up the key
  15807. @param offset offset into the byte array the key starts at
  15808. </member>
  15809. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DesParameters.IsWeakKey(System.Byte[],System.Int32)">
  15810. DES has 16 weak keys. This method will check
  15811. if the given DES key material is weak or semi-weak.
  15812. Key material that is too short is regarded as weak.
  15813. <p>
  15814. See <a href="http://www.counterpane.com/applied.html">"Applied
  15815. Cryptography"</a> by Bruce Schneier for more information.
  15816. </p>
  15817. @return true if the given DES key material is weak or semi-weak,
  15818. false otherwise.
  15819. </member>
  15820. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DesParameters.SetOddParity(System.Byte[])">
  15821. DES Keys use the LSB as the odd parity bit. This can
  15822. be used to check for corrupt keys.
  15823. @param bytes the byte array to set the parity on.
  15824. </member>
  15825. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DHParameters.M">
  15826. <summary>The minimum bitlength of the private value.</summary>
  15827. </member>
  15828. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DHParameters.L">
  15829. <summary>The bitlength of the private value.</summary>
  15830. </member>
  15831. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DsaParameterGenerationParameters.#ctor(System.Int32,System.Int32,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  15832. Construct without a usage index, this will do a random construction of G.
  15833. @param L desired length of prime P in bits (the effective key size).
  15834. @param N desired length of prime Q in bits.
  15835. @param certainty certainty level for prime number generation.
  15836. @param random the source of randomness to use.
  15837. </member>
  15838. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.DsaParameterGenerationParameters.#ctor(System.Int32,System.Int32,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom,System.Int32)">
  15839. Construct for a specific usage index - this has the effect of using verifiable canonical generation of G.
  15840. @param L desired length of prime P in bits (the effective key size).
  15841. @param N desired length of prime Q in bits.
  15842. @param certainty certainty level for prime number generation.
  15843. @param random the source of randomness to use.
  15844. @param usageIndex a valid usage index.
  15845. </member>
  15846. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.ElGamalParameters.G">
  15847. return the generator - g
  15848. </member>
  15849. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.ElGamalParameters.L">
  15850. return private value limit - l
  15851. </member>
  15852. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.HkdfParameters">
  15853. Parameter class for the HkdfBytesGenerator class.
  15854. </member>
  15855. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.HkdfParameters.#ctor(System.Byte[],System.Byte[],System.Byte[])">
  15856. Generates parameters for HKDF, specifying both the optional salt and
  15857. optional info. Step 1: Extract won't be skipped.
  15858. @param ikm the input keying material or seed
  15859. @param salt the salt to use, may be null for a salt for hashLen zeros
  15860. @param info the info to use, may be null for an info field of zero bytes
  15861. </member>
  15862. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.HkdfParameters.SkipExtractParameters(System.Byte[],System.Byte[])">
  15863. Factory method that makes the HKDF skip the extract part of the key
  15864. derivation function.
  15865. @param ikm the input keying material or seed, directly used for step 2:
  15866. Expand
  15867. @param info the info to use, may be null for an info field of zero bytes
  15868. @return HKDFParameters that makes the implementation skip step 1
  15869. </member>
  15870. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.HkdfParameters.GetIkm">
  15871. Returns the input keying material or seed.
  15872. @return the keying material
  15873. </member>
  15874. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.HkdfParameters.SkipExtract">
  15875. Returns if step 1: extract has to be skipped or not
  15876. @return true for skipping, false for no skipping of step 1
  15877. </member>
  15878. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.HkdfParameters.GetSalt">
  15879. Returns the salt, or null if the salt should be generated as a byte array
  15880. of HashLen zeros.
  15881. @return the salt, or null
  15882. </member>
  15883. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.HkdfParameters.GetInfo">
  15884. Returns the info field, which may be empty (null is converted to empty).
  15885. @return the info field, never null
  15886. </member>
  15887. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.IesParameters">
  15888. parameters for using an integrated cipher in stream mode.
  15889. </member>
  15890. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.IesParameters.#ctor(System.Byte[],System.Byte[],System.Int32)">
  15891. @param derivation the derivation parameter for the KDF function.
  15892. @param encoding the encoding parameter for the KDF function.
  15893. @param macKeySize the size of the MAC key (in bits).
  15894. </member>
  15895. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.IesWithCipherParameters.#ctor(System.Byte[],System.Byte[],System.Int32,System.Int32)">
  15896. @param derivation the derivation parameter for the KDF function.
  15897. @param encoding the encoding parameter for the KDF function.
  15898. @param macKeySize the size of the MAC key (in bits).
  15899. @param cipherKeySize the size of the associated Cipher key (in bits).
  15900. </member>
  15901. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.Iso18033KdfParameters">
  15902. parameters for Key derivation functions for ISO-18033
  15903. </member>
  15904. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KdfCounterParameters.#ctor(System.Byte[],System.Byte[],System.Int32)">
  15905. <summary>
  15906. Base constructor - suffix fixed input data only.
  15907. </summary>
  15908. <param name="ki">the KDF seed</param>
  15909. <param name="fixedInputDataCounterSuffix">fixed input data to follow counter.</param>
  15910. <param name="r">length of the counter in bits</param>
  15911. </member>
  15912. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KdfCounterParameters.#ctor(System.Byte[],System.Byte[],System.Byte[],System.Int32)">
  15913. <summary>
  15914. Base constructor - prefix and suffix fixed input data.
  15915. </summary>
  15916. <param name="ki">the KDF seed</param>
  15917. <param name="fixedInputDataCounterPrefix">fixed input data to precede counter</param>
  15918. <param name="fixedInputDataCounterSuffix">fixed input data to follow counter.</param>
  15919. <param name="r">length of the counter in bits.</param>
  15920. </member>
  15921. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KdfParameters">
  15922. parameters for Key derivation functions for IEEE P1363a
  15923. </member>
  15924. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.MgfParameters">
  15925. <remarks>Parameters for mask derivation functions.</remarks>
  15926. </member>
  15927. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyGenerationParameters">
  15928. Parameters for NaccacheStern public private key generation. For details on
  15929. this cipher, please see
  15930. http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf
  15931. </member>
  15932. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyGenerationParameters.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom,System.Int32,System.Int32,System.Int32)">
  15933. Parameters for generating a NaccacheStern KeyPair.
  15934. @param random
  15935. The source of randomness
  15936. @param strength
  15937. The desired strength of the Key in Bits
  15938. @param certainty
  15939. the probability that the generated primes are not really prime
  15940. as integer: 2^(-certainty) is then the probability
  15941. @param countSmallPrimes
  15942. How many small key factors are desired
  15943. </member>
  15944. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyGenerationParameters.Certainty">
  15945. @return Returns the certainty.
  15946. </member>
  15947. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyGenerationParameters.CountSmallPrimes">
  15948. @return Returns the countSmallPrimes.
  15949. </member>
  15950. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyParameters">
  15951. Public key parameters for NaccacheStern cipher. For details on this cipher,
  15952. please see
  15953. http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf
  15954. </member>
  15955. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyParameters.#ctor(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.Int32)">
  15956. @param privateKey
  15957. </member>
  15958. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyParameters.G">
  15959. @return Returns the g.
  15960. </member>
  15961. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyParameters.LowerSigmaBound">
  15962. @return Returns the lowerSigmaBound.
  15963. </member>
  15964. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyParameters.Modulus">
  15965. @return Returns the n.
  15966. </member>
  15967. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.NaccacheSternPrivateKeyParameters">
  15968. Private key parameters for NaccacheStern cipher. For details on this cipher,
  15969. please see
  15970. http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf
  15971. </member>
  15972. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.NaccacheSternPrivateKeyParameters.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.Int32,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger},Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  15973. Constructs a NaccacheSternPrivateKey
  15974. @param g
  15975. the public enryption parameter g
  15976. @param n
  15977. the public modulus n = p*q
  15978. @param lowerSigmaBound
  15979. the public lower sigma bound up to which data can be encrypted
  15980. @param smallPrimes
  15981. the small primes, of which sigma is constructed in the right
  15982. order
  15983. @param phi_n
  15984. the private modulus phi(n) = (p-1)(q-1)
  15985. </member>
  15986. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.ParametersWithSalt">
  15987. <summary> Cipher parameters with a fixed salt value associated with them.</summary>
  15988. </member>
  15989. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters">
  15990. <summary>
  15991. Parameters for the Skein hash function - a series of byte[] strings identified by integer tags.
  15992. </summary>
  15993. <remarks>
  15994. Parameterised Skein can be used for:
  15995. <ul>
  15996. <li>MAC generation, by providing a <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetKey(System.Byte[])">key</see>.</li>
  15997. <li>Randomised hashing, by providing a <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetNonce(System.Byte[])">nonce</see>.</li>
  15998. <li>A hash function for digital signatures, associating a
  15999. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPublicKey(System.Byte[])">public key</see> with the message digest.</li>
  16000. <li>A key derivation function, by providing a
  16001. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetKeyIdentifier(System.Byte[])">key identifier</see>.</li>
  16002. <li>Personalised hashing, by providing a
  16003. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPersonalisation(System.DateTime,System.String,System.String)">recommended format</see> or
  16004. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPersonalisation(System.Byte[])">arbitrary</see> personalisation string.</li>
  16005. </ul>
  16006. </remarks>
  16007. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinEngine"/>
  16008. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests.SkeinDigest"/>
  16009. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.SkeinMac"/>
  16010. </member>
  16011. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY">
  16012. <summary>
  16013. The parameter type for a secret key, supporting MAC or KDF functions: 0
  16014. </summary>
  16015. </member>
  16016. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_CONFIG">
  16017. <summary>
  16018. The parameter type for the Skein configuration block: 4
  16019. </summary>
  16020. </member>
  16021. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_PERSONALISATION">
  16022. <summary>
  16023. The parameter type for a personalisation string: 8
  16024. </summary>
  16025. </member>
  16026. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_PUBLIC_KEY">
  16027. <summary>
  16028. The parameter type for a public key: 12
  16029. </summary>
  16030. </member>
  16031. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY_IDENTIFIER">
  16032. <summary>
  16033. The parameter type for a key identifier string: 16
  16034. </summary>
  16035. </member>
  16036. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_NONCE">
  16037. <summary>
  16038. The parameter type for a nonce: 20
  16039. </summary>
  16040. </member>
  16041. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_MESSAGE">
  16042. <summary>
  16043. The parameter type for the message: 48
  16044. </summary>
  16045. </member>
  16046. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_OUTPUT">
  16047. <summary>
  16048. The parameter type for the output transformation: 63
  16049. </summary>
  16050. </member>
  16051. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetParameters">
  16052. <summary>
  16053. Obtains a map of type (int) to value (byte[]) for the parameters tracked in this object.
  16054. </summary>
  16055. </member>
  16056. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetKey">
  16057. <summary>
  16058. Obtains the value of the <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY">key parameter</see>, or <code>null</code> if not
  16059. set.
  16060. </summary>
  16061. <returns>The key.</returns>
  16062. </member>
  16063. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetPersonalisation">
  16064. <summary>
  16065. Obtains the value of the <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_PERSONALISATION">personalisation parameter</see>, or
  16066. <code>null</code> if not set.
  16067. </summary>
  16068. </member>
  16069. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetPublicKey">
  16070. <summary>
  16071. Obtains the value of the <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_PUBLIC_KEY">public key parameter</see>, or
  16072. <code>null</code> if not set.
  16073. </summary>
  16074. </member>
  16075. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetKeyIdentifier">
  16076. <summary>
  16077. Obtains the value of the <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY_IDENTIFIER">key identifier parameter</see>, or
  16078. <code>null</code> if not set.
  16079. </summary>
  16080. </member>
  16081. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetNonce">
  16082. <summary>
  16083. Obtains the value of the <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_NONCE">nonce parameter</see>, or <code>null</code> if
  16084. not set.
  16085. </summary>
  16086. </member>
  16087. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder">
  16088. <summary>
  16089. A builder for <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/>.
  16090. </summary>
  16091. </member>
  16092. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.Set(System.Int32,System.Byte[])">
  16093. <summary>
  16094. Sets a parameters to apply to the Skein hash function.
  16095. </summary>
  16096. <remarks>
  16097. Parameter types must be in the range 0,5..62, and cannot use the value 48
  16098. (reserved for message body).
  16099. <p/>
  16100. Parameters with type &lt; 48 are processed before
  16101. the message content, parameters with type &gt; 48
  16102. are processed after the message and prior to output.
  16103. </remarks>
  16104. <param name="type">the type of the parameter, in the range 5..62.</param>
  16105. <param name="value">the byte sequence of the parameter.</param>
  16106. </member>
  16107. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetKey(System.Byte[])">
  16108. <summary>
  16109. Sets the <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY"/> parameter.
  16110. </summary>
  16111. </member>
  16112. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPersonalisation(System.Byte[])">
  16113. <summary>
  16114. Sets the <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_PERSONALISATION"/> parameter.
  16115. </summary>
  16116. </member>
  16117. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPersonalisation(System.DateTime,System.String,System.String)">
  16118. <summary>
  16119. Implements the recommended personalisation format for Skein defined in Section 4.11 of
  16120. the Skein 1.3 specification.
  16121. </summary>
  16122. <remarks>
  16123. The format is <code>YYYYMMDD email@address distinguisher</code>, encoded to a byte
  16124. sequence using UTF-8 encoding.
  16125. </remarks>
  16126. <param name="date">the date the personalised application of the Skein was defined.</param>
  16127. <param name="emailAddress">the email address of the creation of the personalised application.</param>
  16128. <param name="distinguisher">an arbitrary personalisation string distinguishing the application.</param>
  16129. </member>
  16130. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPublicKey(System.Byte[])">
  16131. <summary>
  16132. Sets the <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY_IDENTIFIER"/> parameter.
  16133. </summary>
  16134. </member>
  16135. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetKeyIdentifier(System.Byte[])">
  16136. <summary>
  16137. Sets the <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY_IDENTIFIER"/> parameter.
  16138. </summary>
  16139. </member>
  16140. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetNonce(System.Byte[])">
  16141. <summary>
  16142. Sets the <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_NONCE"/> parameter.
  16143. </summary>
  16144. </member>
  16145. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.Build">
  16146. <summary>
  16147. Constructs a new <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/> instance with the parameters provided to this
  16148. builder.
  16149. </summary>
  16150. </member>
  16151. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SM2KeyExchangePrivateParameters">
  16152. <summary>Private parameters for an SM2 key exchange.</summary>
  16153. <remarks>The ephemeralPrivateKey is used to calculate the random point used in the algorithm.</remarks>
  16154. </member>
  16155. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.SM2KeyExchangePublicParameters">
  16156. <summary>Public parameters for an SM2 key exchange.</summary>
  16157. <remarks>In this case the ephemeralPublicKey provides the random point used in the algorithm.</remarks>
  16158. </member>
  16159. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.TweakableBlockCipherParameters">
  16160. <summary>
  16161. Parameters for tweakable block ciphers.
  16162. </summary>
  16163. </member>
  16164. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.TweakableBlockCipherParameters.Key">
  16165. <summary>
  16166. Gets the key.
  16167. </summary>
  16168. <value>the key to use, or <code>null</code> to use the current key.</value>
  16169. </member>
  16170. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.TweakableBlockCipherParameters.Tweak">
  16171. <summary>
  16172. Gets the tweak value.
  16173. </summary>
  16174. <value>The tweak to use, or <code>null</code> to use the current tweak.</value>
  16175. </member>
  16176. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.PbeParametersGenerator">
  16177. super class for all Password Based Encyrption (Pbe) parameter generator classes.
  16178. </member>
  16179. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.PbeParametersGenerator.#ctor">
  16180. base constructor.
  16181. </member>
  16182. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.PbeParametersGenerator.Init(System.Byte[],System.Byte[],System.Int32)">
  16183. initialise the Pbe generator.
  16184. @param password the password converted into bytes (see below).
  16185. @param salt the salt to be mixed with the password.
  16186. @param iterationCount the number of iterations the "mixing" function
  16187. is to be applied for.
  16188. </member>
  16189. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.PbeParametersGenerator.IterationCount">
  16190. return the iteration count.
  16191. @return the iteration count.
  16192. </member>
  16193. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.PbeParametersGenerator.GenerateDerivedMacParameters(System.Int32)">
  16194. Generate derived parameters for a key of length keySize, specifically
  16195. for use with a MAC.
  16196. @param keySize the length, in bits, of the key required.
  16197. @return a parameters object representing a key.
  16198. </member>
  16199. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.PbeParametersGenerator.Pkcs5PasswordToBytes(System.Char[])">
  16200. converts a password to a byte array according to the scheme in
  16201. Pkcs5 (ascii, no padding)
  16202. @param password a character array representing the password.
  16203. @return a byte array representing the password.
  16204. </member>
  16205. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.PbeParametersGenerator.Pkcs5PasswordToUtf8Bytes(System.Char[])">
  16206. converts a password to a byte array according to the scheme in
  16207. PKCS5 (UTF-8, no padding)
  16208. @param password a character array representing the password.
  16209. @return a byte array representing the password.
  16210. </member>
  16211. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.PbeParametersGenerator.Pkcs12PasswordToBytes(System.Char[])">
  16212. converts a password to a byte array according to the scheme in
  16213. Pkcs12 (unicode, big endian, 2 zero pad bytes at the end).
  16214. @param password a character array representing the password.
  16215. @return a byte array representing the password.
  16216. </member>
  16217. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.BasicEntropySourceProvider">
  16218. An EntropySourceProvider where entropy generation is based on a SecureRandom output using SecureRandom.generateSeed().
  16219. </member>
  16220. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.BasicEntropySourceProvider.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom,System.Boolean)">
  16221. Create a entropy source provider based on the passed in SecureRandom.
  16222. @param secureRandom the SecureRandom to base EntropySource construction on.
  16223. @param isPredictionResistant boolean indicating if the SecureRandom is based on prediction resistant entropy or not (true if it is).
  16224. </member>
  16225. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.BasicEntropySourceProvider.Get(System.Int32)">
  16226. Return an entropy source that will create bitsRequired bits of entropy on
  16227. each invocation of getEntropy().
  16228. @param bitsRequired size (in bits) of entropy to be created by the provided source.
  16229. @return an EntropySource that generates bitsRequired bits of entropy on each call to its getEntropy() method.
  16230. </member>
  16231. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.CryptoApiRandomGenerator">
  16232. <summary>
  16233. Uses RandomNumberGenerator.Create() to get randomness generator
  16234. </summary>
  16235. </member>
  16236. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.DigestRandomGenerator">
  16237. Random generation based on the digest with counter. Calling AddSeedMaterial will
  16238. always increase the entropy of the hash.
  16239. <p>
  16240. Internal access to the digest is synchronized so a single one of these can be shared.
  16241. </p>
  16242. </member>
  16243. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg">
  16244. A SP800-90A CTR DRBG.
  16245. </member>
  16246. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySource,System.Byte[],System.Byte[])">
  16247. Construct a SP800-90A CTR DRBG.
  16248. <p>
  16249. Minimum entropy requirement is the security strength requested.
  16250. </p>
  16251. @param engine underlying block cipher to use to support DRBG
  16252. @param keySizeInBits size of the key to use with the block cipher.
  16253. @param securityStrength security strength required (in bits)
  16254. @param entropySource source of entropy to use for seeding/reseeding.
  16255. @param personalizationString personalization string to distinguish this DRBG (may be null).
  16256. @param nonce nonce to further distinguish this DRBG (may be null).
  16257. </member>
  16258. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg.BlockSize">
  16259. Return the block size (in bits) of the DRBG.
  16260. @return the number of bits produced on each internal round of the DRBG.
  16261. </member>
  16262. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg.Generate(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Boolean)">
  16263. Populate a passed in array with random data.
  16264. @param output output array for generated bits.
  16265. @param additionalInput additional input to be added to the DRBG in this step.
  16266. @param predictionResistant true if a reseed should be forced, false otherwise.
  16267. @return number of bits generated, -1 if a reseed required.
  16268. </member>
  16269. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg.Reseed(System.Byte[])">
  16270. Reseed the DRBG.
  16271. @param additionalInput additional input to be added to the DRBG in this step.
  16272. </member>
  16273. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg.PadKey(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  16274. Pad out a key for TDEA, setting odd parity for each byte.
  16275. @param keyMaster
  16276. @param keyOff
  16277. @param tmp
  16278. @param tmpOff
  16279. </member>
  16280. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.DrbgUtilities.HashDF(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.ReadOnlySpan{System.Byte},System.Int32,System.Span{System.Byte})">
  16281. Used by both Dual EC and Hash.
  16282. </member>
  16283. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.HashSP800Drbg">
  16284. A SP800-90A Hash DRBG.
  16285. </member>
  16286. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.HashSP800Drbg.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySource,System.Byte[],System.Byte[])">
  16287. Construct a SP800-90A Hash DRBG.
  16288. <p>
  16289. Minimum entropy requirement is the security strength requested.
  16290. </p>
  16291. @param digest source digest to use for DRB stream.
  16292. @param securityStrength security strength required (in bits)
  16293. @param entropySource source of entropy to use for seeding/reseeding.
  16294. @param personalizationString personalization string to distinguish this DRBG (may be null).
  16295. @param nonce nonce to further distinguish this DRBG (may be null).
  16296. </member>
  16297. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.HashSP800Drbg.BlockSize">
  16298. Return the block size (in bits) of the DRBG.
  16299. @return the number of bits produced on each internal round of the DRBG.
  16300. </member>
  16301. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.HashSP800Drbg.Generate(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Boolean)">
  16302. Populate a passed in array with random data.
  16303. @param output output array for generated bits.
  16304. @param additionalInput additional input to be added to the DRBG in this step.
  16305. @param predictionResistant true if a reseed should be forced, false otherwise.
  16306. @return number of bits generated, -1 if a reseed required.
  16307. </member>
  16308. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.HashSP800Drbg.Reseed(System.Byte[])">
  16309. Reseed the DRBG.
  16310. @param additionalInput additional input to be added to the DRBG in this step.
  16311. </member>
  16312. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.HMacSP800Drbg">
  16313. A SP800-90A HMAC DRBG.
  16314. </member>
  16315. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.HMacSP800Drbg.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySource,System.Byte[],System.Byte[])">
  16316. Construct a SP800-90A Hash DRBG.
  16317. <p>
  16318. Minimum entropy requirement is the security strength requested.
  16319. </p>
  16320. @param hMac Hash MAC to base the DRBG on.
  16321. @param securityStrength security strength required (in bits)
  16322. @param entropySource source of entropy to use for seeding/reseeding.
  16323. @param personalizationString personalization string to distinguish this DRBG (may be null).
  16324. @param nonce nonce to further distinguish this DRBG (may be null).
  16325. </member>
  16326. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.HMacSP800Drbg.BlockSize">
  16327. Return the block size (in bits) of the DRBG.
  16328. @return the number of bits produced on each round of the DRBG.
  16329. </member>
  16330. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.HMacSP800Drbg.Generate(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Boolean)">
  16331. Populate a passed in array with random data.
  16332. @param output output array for generated bits.
  16333. @param additionalInput additional input to be added to the DRBG in this step.
  16334. @param predictionResistant true if a reseed should be forced, false otherwise.
  16335. @return number of bits generated, -1 if a reseed required.
  16336. </member>
  16337. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.HMacSP800Drbg.Reseed(System.Byte[])">
  16338. Reseed the DRBG.
  16339. @param additionalInput additional input to be added to the DRBG in this step.
  16340. </member>
  16341. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.ISP80090Drbg">
  16342. Interface to SP800-90A deterministic random bit generators.
  16343. </member>
  16344. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.ISP80090Drbg.BlockSize">
  16345. Return the block size of the DRBG.
  16346. @return the block size (in bits) produced by each round of the DRBG.
  16347. </member>
  16348. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.ISP80090Drbg.Generate(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Boolean)">
  16349. Populate a passed in array with random data.
  16350. @param output output array for generated bits.
  16351. @param additionalInput additional input to be added to the DRBG in this step.
  16352. @param predictionResistant true if a reseed should be forced, false otherwise.
  16353. @return number of bits generated, -1 if a reseed required.
  16354. </member>
  16355. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg.ISP80090Drbg.Reseed(System.Byte[])">
  16356. Reseed the DRBG.
  16357. @param additionalInput additional input to be added to the DRBG in this step.
  16358. </member>
  16359. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.EntropyUtilities.GenerateSeed(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySource,System.Int32)">
  16360. Generate numBytes worth of entropy from the passed in entropy source.
  16361. @param entropySource the entropy source to request the data from.
  16362. @param numBytes the number of bytes of entropy requested.
  16363. @return a byte array populated with the random data.
  16364. </member>
  16365. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.IRandomGenerator">
  16366. <remarks>Generic interface for objects generating random bytes.</remarks>
  16367. </member>
  16368. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.IRandomGenerator.AddSeedMaterial(System.Byte[])">
  16369. <summary>Add more seed material to the generator.</summary>
  16370. <param name="seed">A byte array to be mixed into the generator's state.</param>
  16371. </member>
  16372. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.IRandomGenerator.AddSeedMaterial(System.Int64)">
  16373. <summary>Add more seed material to the generator.</summary>
  16374. <param name="seed">A long value to be mixed into the generator's state.</param>
  16375. </member>
  16376. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.IRandomGenerator.NextBytes(System.Byte[])">
  16377. <summary>Fill byte array with random values.</summary>
  16378. <param name="bytes">Array to be filled.</param>
  16379. </member>
  16380. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.IRandomGenerator.NextBytes(System.Byte[],System.Int32,System.Int32)">
  16381. <summary>Fill byte array with random values.</summary>
  16382. <param name="bytes">Array to receive bytes.</param>
  16383. <param name="start">Index to start filling at.</param>
  16384. <param name="len">Length of segment to fill.</param>
  16385. </member>
  16386. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.SP800SecureRandom.Reseed(System.Byte[])">
  16387. <summary>Force a reseed of the DRBG.</summary>
  16388. <param name="additionalInput">optional additional input</param>
  16389. </member>
  16390. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder">
  16391. Builder class for making SecureRandom objects based on SP 800-90A Deterministic Random Bit Generators (DRBG).
  16392. </member>
  16393. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.#ctor">
  16394. Basic constructor, creates a builder using an EntropySourceProvider based on the default SecureRandom with
  16395. predictionResistant set to false.
  16396. <p>
  16397. Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if
  16398. the default SecureRandom does for its generateSeed() call.
  16399. </p>
  16400. </member>
  16401. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom,System.Boolean)">
  16402. Construct a builder with an EntropySourceProvider based on the passed in SecureRandom and the passed in value
  16403. for prediction resistance.
  16404. <p>
  16405. Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if
  16406. the passed in SecureRandom does for its generateSeed() call.
  16407. </p>
  16408. @param entropySource
  16409. @param predictionResistant
  16410. </member>
  16411. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySourceProvider)">
  16412. Create a builder which makes creates the SecureRandom objects from a specified entropy source provider.
  16413. <p>
  16414. <b>Note:</b> If this constructor is used any calls to setSeed() in the resulting SecureRandom will be ignored.
  16415. </p>
  16416. @param entropySourceProvider a provider of EntropySource objects.
  16417. </member>
  16418. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.SetPersonalizationString(System.Byte[])">
  16419. Set the personalization string for DRBG SecureRandoms created by this builder
  16420. @param personalizationString the personalisation string for the underlying DRBG.
  16421. @return the current builder.
  16422. </member>
  16423. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.SetSecurityStrength(System.Int32)">
  16424. Set the security strength required for DRBGs used in building SecureRandom objects.
  16425. @param securityStrength the security strength (in bits)
  16426. @return the current builder.
  16427. </member>
  16428. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.SetEntropyBitsRequired(System.Int32)">
  16429. Set the amount of entropy bits required for seeding and reseeding DRBGs used in building SecureRandom objects.
  16430. @param entropyBitsRequired the number of bits of entropy to be requested from the entropy source on each seed/reseed.
  16431. @return the current builder.
  16432. </member>
  16433. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.BuildHash(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.Byte[],System.Boolean)">
  16434. Build a SecureRandom based on a SP 800-90A Hash DRBG.
  16435. @param digest digest algorithm to use in the DRBG underneath the SecureRandom.
  16436. @param nonce nonce value to use in DRBG construction.
  16437. @param predictionResistant specify whether the underlying DRBG in the resulting SecureRandom should reseed on each request for bytes.
  16438. @return a SecureRandom supported by a Hash DRBG.
  16439. </member>
  16440. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.BuildCtr(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,System.Byte[],System.Boolean)">
  16441. Build a SecureRandom based on a SP 800-90A CTR DRBG.
  16442. @param cipher the block cipher to base the DRBG on.
  16443. @param keySizeInBits key size in bits to be used with the block cipher.
  16444. @param nonce nonce value to use in DRBG construction.
  16445. @param predictionResistant specify whether the underlying DRBG in the resulting SecureRandom should reseed on each request for bytes.
  16446. @return a SecureRandom supported by a CTR DRBG.
  16447. </member>
  16448. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.BuildHMac(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IMac,System.Byte[],System.Boolean)">
  16449. Build a SecureRandom based on a SP 800-90A HMAC DRBG.
  16450. @param hMac HMAC algorithm to use in the DRBG underneath the SecureRandom.
  16451. @param nonce nonce value to use in DRBG construction.
  16452. @param predictionResistant specify whether the underlying DRBG in the resulting SecureRandom should reseed on each request for bytes.
  16453. @return a SecureRandom supported by a HMAC DRBG.
  16454. </member>
  16455. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.VmpcRandomGenerator.P">
  16456. <remarks>
  16457. Permutation generated by code:
  16458. <code>
  16459. // First 1850 fractional digit of Pi number.
  16460. byte[] key = new BigInteger("14159265358979323846...5068006422512520511").ToByteArray();
  16461. s = 0;
  16462. P = new byte[256];
  16463. for (int i = 0; i &lt; 256; i++)
  16464. {
  16465. P[i] = (byte) i;
  16466. }
  16467. for (int m = 0; m &lt; 768; m++)
  16468. {
  16469. s = P[(s + P[m &amp; 0xff] + key[m % key.length]) &amp; 0xff];
  16470. byte temp = P[m &amp; 0xff];
  16471. P[m &amp; 0xff] = P[s &amp; 0xff];
  16472. P[s &amp; 0xff] = temp;
  16473. } </code>
  16474. </remarks>
  16475. </member>
  16476. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.VmpcRandomGenerator.s">
  16477. <remarks>Value generated in the same way as <c>P</c>.</remarks>
  16478. </member>
  16479. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.X931Rng.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySource)">
  16480. @param engine
  16481. @param entropySource
  16482. </member>
  16483. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.X931Rng.Reseed">
  16484. Reseed the RNG.
  16485. </member>
  16486. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.X931SecureRandomBuilder.#ctor">
  16487. Basic constructor, creates a builder using an EntropySourceProvider based on the default SecureRandom with
  16488. predictionResistant set to false.
  16489. <p>
  16490. Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if
  16491. the default SecureRandom does for its generateSeed() call.
  16492. </p>
  16493. </member>
  16494. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.X931SecureRandomBuilder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom,System.Boolean)">
  16495. Construct a builder with an EntropySourceProvider based on the passed in SecureRandom and the passed in value
  16496. for prediction resistance.
  16497. <p>
  16498. Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if
  16499. the passed in SecureRandom does for its generateSeed() call.
  16500. </p>
  16501. @param entropySource
  16502. @param predictionResistant
  16503. </member>
  16504. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.X931SecureRandomBuilder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IEntropySourceProvider)">
  16505. Create a builder which makes creates the SecureRandom objects from a specified entropy source provider.
  16506. <p>
  16507. <b>Note:</b> If this constructor is used any calls to setSeed() in the resulting SecureRandom will be ignored.
  16508. </p>
  16509. @param entropySourceProvider a provider of EntropySource objects.
  16510. </member>
  16511. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.X931SecureRandomBuilder.Build(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters.KeyParameter,System.Boolean)">
  16512. Construct a X9.31 secure random generator using the passed in engine and key. If predictionResistant is true the
  16513. generator will be reseeded on each request.
  16514. @param engine a block cipher to use as the operator.
  16515. @param key the block cipher key to initialise engine with.
  16516. @param predictionResistant true if engine to be reseeded on each use, false otherwise.
  16517. @return a SecureRandom.
  16518. </member>
  16519. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.DsaSigner">
  16520. The Digital Signature Algorithm - as described in "Handbook of Applied
  16521. Cryptography", pages 452 - 453.
  16522. </member>
  16523. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.DsaSigner.#ctor">
  16524. Default configuration, random K values.
  16525. </member>
  16526. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.DsaSigner.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.IDsaKCalculator)">
  16527. Configuration with an alternate, possibly deterministic calculator of K.
  16528. @param kCalculator a K value calculator.
  16529. </member>
  16530. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.DsaSigner.GenerateSignature(System.Byte[])">
  16531. Generate a signature for the given message using the key we were
  16532. initialised with. For conventional DSA the message should be a SHA-1
  16533. hash of the message of interest.
  16534. @param message the message that will be verified later.
  16535. </member>
  16536. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.DsaSigner.VerifySignature(System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  16537. return true if the value r and s represent a DSA signature for
  16538. the passed in message for standard DSA the message should be a
  16539. SHA-1 hash of the real message to be verified.
  16540. </member>
  16541. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.ECDsaSigner">
  16542. EC-DSA as described in X9.62
  16543. </member>
  16544. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.ECDsaSigner.#ctor">
  16545. Default configuration, random K values.
  16546. </member>
  16547. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.ECDsaSigner.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.IDsaKCalculator)">
  16548. Configuration with an alternate, possibly deterministic calculator of K.
  16549. @param kCalculator a K value calculator.
  16550. </member>
  16551. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.ECDsaSigner.GenerateSignature(System.Byte[])">
  16552. Generate a signature for the given message using the key we were
  16553. initialised with. For conventional DSA the message should be a SHA-1
  16554. hash of the message of interest.
  16555. @param message the message that will be verified later.
  16556. </member>
  16557. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.ECDsaSigner.VerifySignature(System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  16558. return true if the value r and s represent a DSA signature for
  16559. the passed in message (for standard DSA the message should be
  16560. a SHA-1 hash of the real message to be verified).
  16561. </member>
  16562. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.ECGost3410Signer">
  16563. GOST R 34.10-2001 Signature Algorithm
  16564. </member>
  16565. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.ECGost3410Signer.GenerateSignature(System.Byte[])">
  16566. generate a signature for the given message using the key we were
  16567. initialised with. For conventional GOST3410 the message should be a GOST3411
  16568. hash of the message of interest.
  16569. @param message the message that will be verified later.
  16570. </member>
  16571. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.ECGost3410Signer.VerifySignature(System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  16572. return true if the value r and s represent a GOST3410 signature for
  16573. the passed in message (for standard GOST3410 the message should be
  16574. a GOST3411 hash of the real message to be verified).
  16575. </member>
  16576. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.ECNRSigner">
  16577. EC-NR as described in IEEE 1363-2000
  16578. </member>
  16579. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.ECNRSigner.GenerateSignature(System.Byte[])">
  16580. generate a signature for the given message using the key we were
  16581. initialised with. Generally, the order of the curve should be at
  16582. least as long as the hash of the message of interest, and with
  16583. ECNR it *must* be at least as long.
  16584. @param digest the digest to be signed.
  16585. @exception DataLengthException if the digest is longer than the key allows
  16586. </member>
  16587. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.ECNRSigner.VerifySignature(System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  16588. return true if the value r and s represent a signature for the
  16589. message passed in. Generally, the order of the curve should be at
  16590. least as long as the hash of the message of interest, and with
  16591. ECNR, it *must* be at least as long. But just in case the signer
  16592. applied mod(n) to the longer digest, this implementation will
  16593. apply mod(n) during verification.
  16594. @param digest the digest to be verified.
  16595. @param r the r value of the signature.
  16596. @param s the s value of the signature.
  16597. @exception DataLengthException if the digest is longer than the key allows
  16598. </member>
  16599. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.GenericSigner.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  16600. initialise the signer for signing or verification.
  16601. @param forSigning
  16602. true if for signing, false otherwise
  16603. @param parameters
  16604. necessary parameters.
  16605. </member>
  16606. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Gost3410Signer">
  16607. Gost R 34.10-94 Signature Algorithm
  16608. </member>
  16609. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Gost3410Signer.GenerateSignature(System.Byte[])">
  16610. generate a signature for the given message using the key we were
  16611. initialised with. For conventional Gost3410 the message should be a Gost3411
  16612. hash of the message of interest.
  16613. @param message the message that will be verified later.
  16614. </member>
  16615. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Gost3410Signer.VerifySignature(System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  16616. return true if the value r and s represent a Gost3410 signature for
  16617. the passed in message for standard Gost3410 the message should be a
  16618. Gost3411 hash of the real message to be verified.
  16619. </member>
  16620. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.HMacDsaKCalculator">
  16621. A deterministic K calculator based on the algorithm in section 3.2 of RFC 6979.
  16622. </member>
  16623. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.HMacDsaKCalculator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  16624. Base constructor.
  16625. @param digest digest to build the HMAC on.
  16626. </member>
  16627. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.HMacDsaKCalculator.InitAdditionalInput0(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.HMac)">
  16628. <summary>Supports use of additional input.</summary>
  16629. <remarks>
  16630. RFC 6979 3.6. Additional data may be added to the input of HMAC [..]. A use case may be a protocol that
  16631. requires a non-deterministic signature algorithm on a system that does not have access to a high-quality
  16632. random source. It suffices that the additional data[..] is non-repeating(e.g., a signature counter or a
  16633. monotonic clock) to ensure "random-looking" signatures are indistinguishable, in a cryptographic way, from
  16634. plain (EC)DSA signatures.
  16635. <para/>
  16636. By default there is no additional input. Override this method to supply additional input, bearing in mind
  16637. that this calculator may be used for many signatures.
  16638. </remarks>
  16639. <param name="hmac0">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs.HMac"/> to which the additional input should be added.</param>
  16640. </member>
  16641. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.IDsaEncoding">
  16642. <summary>
  16643. An interface for different encoding formats for DSA signatures.
  16644. </summary>
  16645. </member>
  16646. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.IDsaEncoding.Decode(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.Byte[])">
  16647. <summary>Decode the (r, s) pair of a DSA signature.</summary>
  16648. <param name="n">The order of the group that r, s belong to.</param>
  16649. <param name="encoding">An encoding of the (r, s) pair of a DSA signature.</param>
  16650. <returns>The (r, s) of a DSA signature, stored in an array of exactly two elements, r followed by s.</returns>
  16651. </member>
  16652. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.IDsaEncoding.Encode(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  16653. <summary>Encode the (r, s) pair of a DSA signature.</summary>
  16654. <param name="n">The order of the group that r, s belong to.</param>
  16655. <param name="r">The r value of a DSA signature.</param>
  16656. <param name="s">The s value of a DSA signature.</param>
  16657. <returns>An encoding of the DSA signature given by the provided (r, s) pair.</returns>
  16658. </member>
  16659. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.IDsaKCalculator">
  16660. Interface define calculators of K values for DSA/ECDSA.
  16661. </member>
  16662. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.IDsaKCalculator.IsDeterministic">
  16663. Return true if this calculator is deterministic, false otherwise.
  16664. @return true if deterministic, otherwise false.
  16665. </member>
  16666. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.IDsaKCalculator.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  16667. Non-deterministic initialiser.
  16668. @param n the order of the DSA group.
  16669. @param random a source of randomness.
  16670. </member>
  16671. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.IDsaKCalculator.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.Byte[])">
  16672. Deterministic initialiser.
  16673. @param n the order of the DSA group.
  16674. @param d the DSA private value.
  16675. @param message the message being signed.
  16676. </member>
  16677. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.IDsaKCalculator.NextK">
  16678. Return the next valid value of K.
  16679. @return a K value.
  16680. </member>
  16681. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner">
  16682. <summary> ISO9796-2 - mechanism using a hash function with recovery (scheme 2 and 3).
  16683. <p>
  16684. Note: the usual length for the salt is the length of the hash
  16685. function used in bytes.</p>
  16686. </summary>
  16687. </member>
  16688. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.GetRecoveredMessage">
  16689. <summary>
  16690. Return a reference to the recoveredMessage message.
  16691. </summary>
  16692. <returns>The full/partial recoveredMessage message.</returns>
  16693. <seealso cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignerWithRecovery.GetRecoveredMessage"/>
  16694. </member>
  16695. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.Int32,System.Boolean)">
  16696. <summary>
  16697. Generate a signer with either implicit or explicit trailers for ISO9796-2, scheme 2 or 3.
  16698. </summary>
  16699. <param name="cipher">base cipher to use for signature creation/verification</param>
  16700. <param name="digest">digest to use.</param>
  16701. <param name="saltLength">length of salt in bytes.</param>
  16702. <param name="isImplicit">whether or not the trailer is implicit or gives the hash.</param>
  16703. </member>
  16704. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.Int32)">
  16705. <summary> Constructor for a signer with an explicit digest trailer.
  16706. </summary>
  16707. <param name="cipher">cipher to use.
  16708. </param>
  16709. <param name="digest">digest to sign with.
  16710. </param>
  16711. <param name="saltLength">length of salt in bytes.
  16712. </param>
  16713. </member>
  16714. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  16715. <summary>Initialise the signer.</summary>
  16716. <param name="forSigning">true if for signing, false if for verification.</param>
  16717. <param name="parameters">parameters for signature generation/verification. If the
  16718. parameters are for generation they should be a ParametersWithRandom,
  16719. a ParametersWithSalt, or just an RsaKeyParameters object. If RsaKeyParameters
  16720. are passed in a SecureRandom will be created.
  16721. </param>
  16722. <exception cref="T:System.ArgumentException">if wrong parameter type or a fixed
  16723. salt is passed in which is the wrong length.
  16724. </exception>
  16725. </member>
  16726. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.IsSameAs(System.Byte[],System.Byte[])">
  16727. <summary> compare two byte arrays - constant time.</summary>
  16728. </member>
  16729. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.ClearBlock(System.Byte[])">
  16730. <summary> clear possible sensitive data</summary>
  16731. </member>
  16732. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.Update(System.Byte)">
  16733. <summary> update the internal digest with the byte b</summary>
  16734. </member>
  16735. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.Reset">
  16736. <summary> reset the internal state</summary>
  16737. </member>
  16738. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.GenerateSignature">
  16739. <summary> Generate a signature for the loaded message using the key we were
  16740. initialised with.
  16741. </summary>
  16742. </member>
  16743. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.VerifySignature(System.Byte[])">
  16744. <summary> return true if the signature represents a ISO9796-2 signature
  16745. for the passed in message.
  16746. </summary>
  16747. </member>
  16748. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.HasFullMessage">
  16749. <summary>
  16750. Return true if the full message was recoveredMessage.
  16751. </summary>
  16752. <returns>true on full message recovery, false otherwise, or if not sure.</returns>
  16753. <seealso cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignerWithRecovery.HasFullMessage"/>
  16754. </member>
  16755. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.ItoOSP(System.Int32,System.Byte[])">
  16756. <summary> int to octet string.</summary>
  16757. <summary> int to octet string.</summary>
  16758. </member>
  16759. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.LtoOSP(System.Int64,System.Byte[])">
  16760. <summary> long to octet string.</summary>
  16761. </member>
  16762. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.MaskGeneratorFunction1(System.Byte[],System.Int32,System.Int32,System.Int32)">
  16763. <summary> mask generator function, as described in Pkcs1v2.</summary>
  16764. </member>
  16765. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer">
  16766. <summary> ISO9796-2 - mechanism using a hash function with recovery (scheme 1)</summary>
  16767. </member>
  16768. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.GetRecoveredMessage">
  16769. <summary>
  16770. Return a reference to the recoveredMessage message.
  16771. </summary>
  16772. <returns>The full/partial recoveredMessage message.</returns>
  16773. <seealso cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignerWithRecovery.GetRecoveredMessage"/>
  16774. </member>
  16775. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.Boolean)">
  16776. <summary>
  16777. Generate a signer with either implicit or explicit trailers for ISO9796-2.
  16778. </summary>
  16779. <param name="cipher">base cipher to use for signature creation/verification</param>
  16780. <param name="digest">digest to use.</param>
  16781. <param name="isImplicit">whether or not the trailer is implicit or gives the hash.</param>
  16782. </member>
  16783. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  16784. <summary> Constructor for a signer with an explicit digest trailer.
  16785. </summary>
  16786. <param name="cipher">cipher to use.
  16787. </param>
  16788. <param name="digest">digest to sign with.
  16789. </param>
  16790. </member>
  16791. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.IsSameAs(System.Byte[],System.Byte[])">
  16792. <summary> compare two byte arrays - constant time.</summary>
  16793. </member>
  16794. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.ClearBlock(System.Byte[])">
  16795. <summary> clear possible sensitive data</summary>
  16796. </member>
  16797. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.Reset">
  16798. <summary> reset the internal state</summary>
  16799. </member>
  16800. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.GenerateSignature">
  16801. <summary> Generate a signature for the loaded message using the key we were
  16802. initialised with.
  16803. </summary>
  16804. </member>
  16805. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.VerifySignature(System.Byte[])">
  16806. <summary> return true if the signature represents a ISO9796-2 signature
  16807. for the passed in message.
  16808. </summary>
  16809. </member>
  16810. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.HasFullMessage">
  16811. <summary>
  16812. Return true if the full message was recoveredMessage.
  16813. </summary>
  16814. <returns> true on full message recovery, false otherwise.</returns>
  16815. <seealso cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignerWithRecovery.HasFullMessage"/>
  16816. </member>
  16817. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.PssSigner">
  16818. <summary> RSA-PSS as described in Pkcs# 1 v 2.1.
  16819. <p>
  16820. Note: the usual value for the salt length is the number of
  16821. bytes in the hash function.</p>
  16822. </summary>
  16823. </member>
  16824. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.PssSigner.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.Int32)">
  16825. <summary>Basic constructor</summary>
  16826. <param name="cipher">the asymmetric cipher to use.</param>
  16827. <param name="digest">the digest to use.</param>
  16828. <param name="saltLen">the length of the salt to use (in bytes).</param>
  16829. </member>
  16830. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.PssSigner.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.Byte[])">
  16831. <summary>Basic constructor</summary>
  16832. <param name="cipher">the asymmetric cipher to use.</param>
  16833. <param name="digest">the digest to use.</param>
  16834. <param name="salt">the fixed salt to be used.</param>
  16835. </member>
  16836. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.PssSigner.ClearBlock(System.Byte[])">
  16837. <summary> clear possible sensitive data</summary>
  16838. </member>
  16839. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.PssSigner.ItoOSP(System.Int32,System.Byte[])">
  16840. <summary> int to octet string.</summary>
  16841. </member>
  16842. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.PssSigner.MaskGeneratorFunction1(System.Byte[],System.Int32,System.Int32,System.Int32)">
  16843. <summary> mask generator function, as described in Pkcs1v2.</summary>
  16844. </member>
  16845. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.RsaDigestSigner.#cctor">
  16846. <summary>
  16847. Load oid table.
  16848. </summary>
  16849. </member>
  16850. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.RsaDigestSigner.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  16851. Initialise the signer for signing or verification.
  16852. @param forSigning true if for signing, false otherwise
  16853. @param param necessary parameters.
  16854. </member>
  16855. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.SM2Signer">
  16856. <summary>The SM2 Digital Signature algorithm.</summary>
  16857. </member>
  16858. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.X931Signer">
  16859. X9.31-1998 - signing using a hash.
  16860. <p>
  16861. The message digest hash, H, is encapsulated to form a byte string as follows
  16862. </p>
  16863. <pre>
  16864. EB = 06 || PS || 0xBA || H || TRAILER
  16865. </pre>
  16866. where PS is a string of bytes all of value 0xBB of length such that |EB|=|n|, and TRAILER is the ISO/IEC 10118 part number† for the digest. The byte string, EB, is converted to an integer value, the message representative, f.
  16867. </member>
  16868. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.X931Signer.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.Boolean)">
  16869. Generate a signer with either implicit or explicit trailers for X9.31.
  16870. @param cipher base cipher to use for signature creation/verification
  16871. @param digest digest to use.
  16872. @param implicit whether or not the trailer is implicit or gives the hash.
  16873. </member>
  16874. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers.X931Signer.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  16875. Constructor for a signer with an explicit digest trailer.
  16876. @param cipher cipher to use.
  16877. @param digest digest to sign with.
  16878. </member>
  16879. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.SimpleBlockResult">
  16880. <summary>
  16881. A simple block result object which just carries a byte array.
  16882. </summary>
  16883. </member>
  16884. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.SimpleBlockResult.#ctor(System.Byte[])">
  16885. <summary>
  16886. Base constructor - a wrapper for the passed in byte array.
  16887. </summary>
  16888. <param name="result">The byte array to be wrapped.</param>
  16889. </member>
  16890. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.SimpleBlockResult.Length">
  16891. <summary>
  16892. Return the number of bytes in the result
  16893. </summary>
  16894. <value>The length of the result in bytes.</value>
  16895. </member>
  16896. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.SimpleBlockResult.Collect">
  16897. <summary>
  16898. Return the final result of the operation.
  16899. </summary>
  16900. <returns>A block of bytes, representing the result of an operation.</returns>
  16901. </member>
  16902. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.SimpleBlockResult.Collect(System.Byte[],System.Int32)">
  16903. <summary>
  16904. Store the final result of the operation by copying it into the destination array.
  16905. </summary>
  16906. <returns>The number of bytes copied into destination.</returns>
  16907. <param name="destination">The byte array to copy the result into.</param>
  16908. <param name="offset">The offset into destination to start copying the result at.</param>
  16909. </member>
  16910. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.StreamBlockCipher">
  16911. a wrapper for block ciphers with a single byte block size, so that they
  16912. can be treated like stream ciphers.
  16913. </member>
  16914. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.StreamBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.IBlockCipherMode)">
  16915. basic constructor.
  16916. @param cipher the block cipher to be wrapped.
  16917. @exception ArgumentException if the cipher has a block size other than
  16918. one.
  16919. </member>
  16920. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.StreamBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  16921. initialise the underlying cipher.
  16922. @param forEncryption true if we are setting up for encryption, false otherwise.
  16923. @param param the necessary parameters for the underlying cipher to be initialised.
  16924. </member>
  16925. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.StreamBlockCipher.AlgorithmName">
  16926. return the name of the algorithm we are wrapping.
  16927. @return the name of the algorithm we are wrapping.
  16928. </member>
  16929. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.StreamBlockCipher.ReturnByte(System.Byte)">
  16930. encrypt/decrypt a single byte returning the result.
  16931. @param in the byte to be processed.
  16932. @return the result of processing the input byte.
  16933. </member>
  16934. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.StreamBlockCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  16935. process a block of bytes from in putting the result into out.
  16936. @param in the input byte array.
  16937. @param inOff the offset into the in array where the data to be processed starts.
  16938. @param len the number of bytes to be processed.
  16939. @param out the output buffer the processed bytes go into.
  16940. @param outOff the offset into the output byte array the processed data stars at.
  16941. @exception DataLengthException if the output buffer is too small.
  16942. </member>
  16943. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.StreamBlockCipher.Reset">
  16944. reset the underlying cipher. This leaves it in the same state
  16945. it was at after the last init (if there was one).
  16946. </member>
  16947. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities.AlgorithmIdentifierFactory.GenerateEncryptionAlgID(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  16948. Create an AlgorithmIdentifier for the passed in encryption algorithm.
  16949. @param encryptionOID OID for the encryption algorithm
  16950. @param keySize key size in bits (-1 if unknown)
  16951. @param random SecureRandom to use for parameter generation.
  16952. @return a full AlgorithmIdentifier including parameters
  16953. @throws IllegalArgumentException if encryptionOID cannot be matched
  16954. </member>
  16955. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities.BasicAlphabetMapper">
  16956. A basic alphabet mapper that just creates a mapper based on the
  16957. passed in array of characters.
  16958. </member>
  16959. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities.BasicAlphabetMapper.#ctor(System.String)">
  16960. Base constructor.
  16961. @param alphabet a string of characters making up the alphabet.
  16962. </member>
  16963. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities.BasicAlphabetMapper.#ctor(System.Char[])">
  16964. Base constructor.
  16965. @param alphabet an array of characters making up the alphabet.
  16966. </member>
  16967. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities.CipherKeyGeneratorFactory.CreateKeyGenerator(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  16968. Create a key generator for the passed in Object Identifier.
  16969. @param algorithm the Object Identifier indicating the algorithn the generator is for.
  16970. @param random a source of random to initialise the generator with.
  16971. @return an initialised CipherKeyGenerator.
  16972. @throws IllegalArgumentException if the algorithm cannot be identified.
  16973. </member>
  16974. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Operators.CmsKeyTransRecipientInfoGenerator">
  16975. <deprecated>Use KeyTransRecipientInfoGenerator</deprecated>
  16976. </member>
  16977. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.AddMagnitudes(System.Int32[],System.Int32[])">
  16978. return a = a + b - b preserved.
  16979. </member>
  16980. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.CompareTo(System.Int32,System.Int32[],System.Int32,System.Int32[])">
  16981. unsigned comparison on two arrays - note the arrays may
  16982. start with leading zeros.
  16983. </member>
  16984. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.Divide(System.Int32[],System.Int32[])">
  16985. return z = x / y - done in place (z value preserved, x contains the
  16986. remainder)
  16987. </member>
  16988. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.IsProbablePrime(System.Int32)">
  16989. return whether or not a BigInteger is probably prime with a
  16990. probability of 1 - (1/2)**certainty.
  16991. <p>From Knuth Vol 2, pg 395.</p>
  16992. </member>
  16993. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.ExtEuclid(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger@)">
  16994. Calculate the numbers u1, u2, and u3 such that:
  16995. u1 * a + u2 * b = u3
  16996. where u3 is the greatest common divider of a and b.
  16997. a and b using the extended Euclid algorithm (refer p. 323
  16998. of The Art of Computer Programming vol 2, 2nd ed).
  16999. This also seems to have the side effect of calculating
  17000. some form of multiplicative inverse.
  17001. @param a First number to calculate gcd for
  17002. @param b Second number to calculate gcd for
  17003. @param u1Out the return object for the u1 value
  17004. @return The greatest common divisor of a and b
  17005. </member>
  17006. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.Square(System.Int32[],System.Int32[])">
  17007. return w with w = x * x - w is assumed to have enough space.
  17008. </member>
  17009. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.Multiply(System.Int32[],System.Int32[],System.Int32[])">
  17010. return x with x = y * z - x is assumed to have enough space.
  17011. </member>
  17012. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.GetMQuote">
  17013. Calculate mQuote = -m^(-1) mod b with b = 2^32 (32 = word size)
  17014. </member>
  17015. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.MultiplyMonty(System.Int32[],System.Int32[],System.Int32[],System.Int32[],System.UInt32,System.Boolean)">
  17016. Montgomery multiplication: a = x * y * R^(-1) mod m
  17017. <br/>
  17018. Based algorithm 14.36 of Handbook of Applied Cryptography.
  17019. <br/>
  17020. <li> m, x, y should have length n </li>
  17021. <li> a should have length (n + 1) </li>
  17022. <li> b = 2^32, R = b^n </li>
  17023. <br/>
  17024. The result is put in x
  17025. <br/>
  17026. NOTE: the indices of x, y, m, a different in HAC and in Java
  17027. </member>
  17028. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.Remainder(System.Int32[],System.Int32[])">
  17029. return x = x % y - done in place (y value preserved)
  17030. </member>
  17031. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.ShiftLeft(System.Int32[],System.Int32)">
  17032. do a left shift - this returns a new array.
  17033. </member>
  17034. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.ShiftRightInPlace(System.Int32,System.Int32[],System.Int32)">
  17035. do a right shift - this does it in place.
  17036. </member>
  17037. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.ShiftRightOneInPlace(System.Int32,System.Int32[])">
  17038. do a right shift by one - this does it in place.
  17039. </member>
  17040. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger.Subtract(System.Int32,System.Int32[],System.Int32,System.Int32[])">
  17041. returns x = x - y - we assume x is >= y
  17042. </member>
  17043. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal">
  17044. Class representing a simple version of a big decimal. A
  17045. <code>SimpleBigDecimal</code> is basically a
  17046. {@link java.math.BigInteger BigInteger} with a few digits on the right of
  17047. the decimal point. The number of (binary) digits on the right of the decimal
  17048. point is called the <code>scale</code> of the <code>SimpleBigDecimal</code>.
  17049. Unlike in {@link java.math.BigDecimal BigDecimal}, the scale is not adjusted
  17050. automatically, but must be set manually. All <code>SimpleBigDecimal</code>s
  17051. taking part in the same arithmetic operation must have equal scale. The
  17052. result of a multiplication of two <code>SimpleBigDecimal</code>s returns a
  17053. <code>SimpleBigDecimal</code> with double scale.
  17054. </member>
  17055. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.Int32)">
  17056. Returns a <code>SimpleBigDecimal</code> representing the same numerical
  17057. value as <code>value</code>.
  17058. @param value The value of the <code>SimpleBigDecimal</code> to be
  17059. created.
  17060. @param scale The scale of the <code>SimpleBigDecimal</code> to be
  17061. created.
  17062. @return The such created <code>SimpleBigDecimal</code>.
  17063. </member>
  17064. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.Int32)">
  17065. Constructor for <code>SimpleBigDecimal</code>. The value of the
  17066. constructed <code>SimpleBigDecimal</code> Equals <code>bigInt /
  17067. 2<sup>scale</sup></code>.
  17068. @param bigInt The <code>bigInt</code> value parameter.
  17069. @param scale The scale of the constructed <code>SimpleBigDecimal</code>.
  17070. </member>
  17071. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf">
  17072. Class holding methods for point multiplication based on the window
  17073. &#964;-adic nonadjacent form (WTNAF). The algorithms are based on the
  17074. paper "Improved Algorithms for Arithmetic on Anomalous Binary Curves"
  17075. by Jerome A. Solinas. The paper first appeared in the Proceedings of
  17076. Crypto 1997.
  17077. </member>
  17078. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.Width">
  17079. The window width of WTNAF. The standard value of 4 is slightly less
  17080. than optimal for running time, but keeps space requirements for
  17081. precomputation low. For typical curves, a value of 5 or 6 results in
  17082. a better running time. When changing this value, the
  17083. <code>&#945;<sub>u</sub></code>'s must be computed differently, see
  17084. e.g. "Guide to Elliptic Curve Cryptography", Darrel Hankerson,
  17085. Alfred Menezes, Scott Vanstone, Springer-Verlag New York Inc., 2004,
  17086. p. 121-122
  17087. </member>
  17088. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.Pow2Width">
  17089. 2<sup>4</sup>
  17090. </member>
  17091. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.Alpha0">
  17092. The <code>&#945;<sub>u</sub></code>'s for <code>a=0</code> as an array
  17093. of <code>ZTauElement</code>s.
  17094. </member>
  17095. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.Alpha0Tnaf">
  17096. The <code>&#945;<sub>u</sub></code>'s for <code>a=0</code> as an array
  17097. of TNAFs.
  17098. </member>
  17099. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.Alpha1">
  17100. The <code>&#945;<sub>u</sub></code>'s for <code>a=1</code> as an array
  17101. of <code>ZTauElement</code>s.
  17102. </member>
  17103. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.Alpha1Tnaf">
  17104. The <code>&#945;<sub>u</sub></code>'s for <code>a=1</code> as an array
  17105. of TNAFs.
  17106. </member>
  17107. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.Norm(System.SByte,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.ZTauElement)">
  17108. Computes the norm of an element <code>&#955;</code> of
  17109. <code><b>Z</b>[&#964;]</code>.
  17110. @param mu The parameter <code>&#956;</code> of the elliptic curve.
  17111. @param lambda The element <code>&#955;</code> of
  17112. <code><b>Z</b>[&#964;]</code>.
  17113. @return The norm of <code>&#955;</code>.
  17114. </member>
  17115. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.Norm(System.SByte,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal)">
  17116. Computes the norm of an element <code>&#955;</code> of
  17117. <code><b>R</b>[&#964;]</code>, where <code>&#955; = u + v&#964;</code>
  17118. and <code>u</code> and <code>u</code> are real numbers (elements of
  17119. <code><b>R</b></code>).
  17120. @param mu The parameter <code>&#956;</code> of the elliptic curve.
  17121. @param u The real part of the element <code>&#955;</code> of
  17122. <code><b>R</b>[&#964;]</code>.
  17123. @param v The <code>&#964;</code>-adic part of the element
  17124. <code>&#955;</code> of <code><b>R</b>[&#964;]</code>.
  17125. @return The norm of <code>&#955;</code>.
  17126. </member>
  17127. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.Round(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal,System.SByte)">
  17128. Rounds an element <code>&#955;</code> of <code><b>R</b>[&#964;]</code>
  17129. to an element of <code><b>Z</b>[&#964;]</code>, such that their difference
  17130. has minimal norm. <code>&#955;</code> is given as
  17131. <code>&#955; = &#955;<sub>0</sub> + &#955;<sub>1</sub>&#964;</code>.
  17132. @param lambda0 The component <code>&#955;<sub>0</sub></code>.
  17133. @param lambda1 The component <code>&#955;<sub>1</sub></code>.
  17134. @param mu The parameter <code>&#956;</code> of the elliptic curve. Must
  17135. equal 1 or -1.
  17136. @return The rounded element of <code><b>Z</b>[&#964;]</code>.
  17137. @throws ArgumentException if <code>lambda0</code> and
  17138. <code>lambda1</code> do not have same scale.
  17139. </member>
  17140. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.ApproximateDivisionByN(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.SByte,System.Int32,System.Int32)">
  17141. Approximate division by <code>n</code>. For an integer
  17142. <code>k</code>, the value <code>&#955; = s k / n</code> is
  17143. computed to <code>c</code> bits of accuracy.
  17144. @param k The parameter <code>k</code>.
  17145. @param s The curve parameter <code>s<sub>0</sub></code> or
  17146. <code>s<sub>1</sub></code>.
  17147. @param vm The Lucas Sequence element <code>V<sub>m</sub></code>.
  17148. @param a The parameter <code>a</code> of the elliptic curve.
  17149. @param m The bit length of the finite field
  17150. <code><b>F</b><sub>m</sub></code>.
  17151. @param c The number of bits of accuracy, i.e. the scale of the returned
  17152. <code>SimpleBigDecimal</code>.
  17153. @return The value <code>&#955; = s k / n</code> computed to
  17154. <code>c</code> bits of accuracy.
  17155. </member>
  17156. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.TauAdicNaf(System.SByte,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.ZTauElement)">
  17157. Computes the <code>&#964;</code>-adic NAF (non-adjacent form) of an
  17158. element <code>&#955;</code> of <code><b>Z</b>[&#964;]</code>.
  17159. @param mu The parameter <code>&#956;</code> of the elliptic curve.
  17160. @param lambda The element <code>&#955;</code> of
  17161. <code><b>Z</b>[&#964;]</code>.
  17162. @return The <code>&#964;</code>-adic NAF of <code>&#955;</code>.
  17163. </member>
  17164. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.Tau(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mPoint)">
  17165. Applies the operation <code>&#964;()</code> to an
  17166. <code>AbstractF2mPoint</code>.
  17167. @param p The AbstractF2mPoint to which <code>&#964;()</code> is applied.
  17168. @return <code>&#964;(p)</code>
  17169. </member>
  17170. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.GetMu(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mCurve)">
  17171. Returns the parameter <code>&#956;</code> of the elliptic curve.
  17172. @param curve The elliptic curve from which to obtain <code>&#956;</code>.
  17173. The curve must be a Koblitz curve, i.e. <code>a</code> Equals
  17174. <code>0</code> or <code>1</code> and <code>b</code> Equals
  17175. <code>1</code>.
  17176. @return <code>&#956;</code> of the elliptic curve.
  17177. @throws ArgumentException if the given ECCurve is not a Koblitz
  17178. curve.
  17179. </member>
  17180. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.GetLucas(System.SByte,System.Int32,System.Boolean)">
  17181. Calculates the Lucas Sequence elements <code>U<sub>k-1</sub></code> and
  17182. <code>U<sub>k</sub></code> or <code>V<sub>k-1</sub></code> and
  17183. <code>V<sub>k</sub></code>.
  17184. @param mu The parameter <code>&#956;</code> of the elliptic curve.
  17185. @param k The index of the second element of the Lucas Sequence to be
  17186. returned.
  17187. @param doV If set to true, computes <code>V<sub>k-1</sub></code> and
  17188. <code>V<sub>k</sub></code>, otherwise <code>U<sub>k-1</sub></code> and
  17189. <code>U<sub>k</sub></code>.
  17190. @return An array with 2 elements, containing <code>U<sub>k-1</sub></code>
  17191. and <code>U<sub>k</sub></code> or <code>V<sub>k-1</sub></code>
  17192. and <code>V<sub>k</sub></code>.
  17193. </member>
  17194. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.GetTw(System.SByte,System.Int32)">
  17195. Computes the auxiliary value <code>t<sub>w</sub></code>. If the width is
  17196. 4, then for <code>mu = 1</code>, <code>t<sub>w</sub> = 6</code> and for
  17197. <code>mu = -1</code>, <code>t<sub>w</sub> = 10</code>
  17198. @param mu The parameter <code>&#956;</code> of the elliptic curve.
  17199. @param w The window width of the WTNAF.
  17200. @return the auxiliary value <code>t<sub>w</sub></code>
  17201. </member>
  17202. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.GetSi(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mCurve)">
  17203. Computes the auxiliary values <code>s<sub>0</sub></code> and
  17204. <code>s<sub>1</sub></code> used for partial modular reduction.
  17205. @param curve The elliptic curve for which to compute
  17206. <code>s<sub>0</sub></code> and <code>s<sub>1</sub></code>.
  17207. @throws ArgumentException if <code>curve</code> is not a
  17208. Koblitz curve (Anomalous Binary Curve, ABC).
  17209. </member>
  17210. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.PartModReduction(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.Int32,System.SByte,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger[],System.SByte,System.SByte)">
  17211. Partial modular reduction modulo
  17212. <code>(&#964;<sup>m</sup> - 1)/(&#964; - 1)</code>.
  17213. @param k The integer to be reduced.
  17214. @param m The bitlength of the underlying finite field.
  17215. @param a The parameter <code>a</code> of the elliptic curve.
  17216. @param s The auxiliary values <code>s<sub>0</sub></code> and
  17217. <code>s<sub>1</sub></code>.
  17218. @param mu The parameter &#956; of the elliptic curve.
  17219. @param c The precision (number of bits of accuracy) of the partial
  17220. modular reduction.
  17221. @return <code>&#961; := k partmod (&#964;<sup>m</sup> - 1)/(&#964; - 1)</code>
  17222. </member>
  17223. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.MultiplyRTnaf(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mPoint,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17224. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  17225. by a <code>BigInteger</code> using the reduced <code>&#964;</code>-adic
  17226. NAF (RTNAF) method.
  17227. @param p The AbstractF2mPoint to Multiply.
  17228. @param k The <code>BigInteger</code> by which to Multiply <code>p</code>.
  17229. @return <code>k * p</code>
  17230. </member>
  17231. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.MultiplyTnaf(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mPoint,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.ZTauElement)">
  17232. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  17233. by an element <code>&#955;</code> of <code><b>Z</b>[&#964;]</code>
  17234. using the <code>&#964;</code>-adic NAF (TNAF) method.
  17235. @param p The AbstractF2mPoint to Multiply.
  17236. @param lambda The element <code>&#955;</code> of
  17237. <code><b>Z</b>[&#964;]</code>.
  17238. @return <code>&#955; * p</code>
  17239. </member>
  17240. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.MultiplyFromTnaf(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mPoint,System.SByte[])">
  17241. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  17242. by an element <code>&#955;</code> of <code><b>Z</b>[&#964;]</code>
  17243. using the <code>&#964;</code>-adic NAF (TNAF) method, given the TNAF
  17244. of <code>&#955;</code>.
  17245. @param p The AbstractF2mPoint to Multiply.
  17246. @param u The the TNAF of <code>&#955;</code>..
  17247. @return <code>&#955; * p</code>
  17248. </member>
  17249. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.TauAdicWNaf(System.SByte,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.ZTauElement,System.SByte,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.ZTauElement[])">
  17250. Computes the <code>[&#964;]</code>-adic window NAF of an element
  17251. <code>&#955;</code> of <code><b>Z</b>[&#964;]</code>.
  17252. @param mu The parameter &#956; of the elliptic curve.
  17253. @param lambda The element <code>&#955;</code> of
  17254. <code><b>Z</b>[&#964;]</code> of which to compute the
  17255. <code>[&#964;]</code>-adic NAF.
  17256. @param width The window width of the resulting WNAF.
  17257. @param pow2w 2<sup>width</sup>.
  17258. @param tw The auxiliary value <code>t<sub>w</sub></code>.
  17259. @param alpha The <code>&#945;<sub>u</sub></code>'s for the window width.
  17260. @return The <code>[&#964;]</code>-adic window NAF of
  17261. <code>&#955;</code>.
  17262. </member>
  17263. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.Tnaf.GetPreComp(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mPoint,System.SByte)">
  17264. Does the precomputation for WTNAF multiplication.
  17265. @param p The <code>ECPoint</code> for which to do the precomputation.
  17266. @param a The parameter <code>a</code> of the elliptic curve.
  17267. @return The precomputation array for <code>p</code>.
  17268. </member>
  17269. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.ZTauElement">
  17270. Class representing an element of <code><b>Z</b>[&#964;]</code>. Let
  17271. <code>&#955;</code> be an element of <code><b>Z</b>[&#964;]</code>. Then
  17272. <code>&#955;</code> is given as <code>&#955; = u + v&#964;</code>. The
  17273. components <code>u</code> and <code>v</code> may be used directly, there
  17274. are no accessor methods.
  17275. Immutable class.
  17276. </member>
  17277. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.ZTauElement.u">
  17278. The &quot;real&quot; part of <code>&#955;</code>.
  17279. </member>
  17280. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.ZTauElement.v">
  17281. The &quot;<code>&#964;</code>-adic&quot; part of <code>&#955;</code>.
  17282. </member>
  17283. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.ZTauElement.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17284. Constructor for an element <code>&#955;</code> of
  17285. <code><b>Z</b>[&#964;]</code>.
  17286. @param u The &quot;real&quot; part of <code>&#955;</code>.
  17287. @param v The &quot;<code>&#964;</code>-adic&quot; part of
  17288. <code>&#955;</code>.
  17289. </member>
  17290. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.GM.SM2P256V1FieldElement.Sqrt">
  17291. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17292. none exists it returns null.
  17293. </member>
  17294. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec.SecP128R1FieldElement.Sqrt">
  17295. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17296. none exists it returns null.
  17297. </member>
  17298. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec.SecP160R1FieldElement.Sqrt">
  17299. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17300. none exists it returns null.
  17301. </member>
  17302. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec.SecP160R2FieldElement.Sqrt">
  17303. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17304. none exists it returns null.
  17305. </member>
  17306. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec.SecP192K1FieldElement.Sqrt">
  17307. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17308. none exists it returns null.
  17309. </member>
  17310. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec.SecP192R1FieldElement.Sqrt">
  17311. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17312. none exists it returns null.
  17313. </member>
  17314. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec.SecP224K1FieldElement.Sqrt">
  17315. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17316. none exists it returns null.
  17317. </member>
  17318. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec.SecP224R1FieldElement.Sqrt">
  17319. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17320. none exists it returns null.
  17321. </member>
  17322. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec.SecP256K1FieldElement.Sqrt">
  17323. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17324. none exists it returns null.
  17325. </member>
  17326. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec.SecP256R1FieldElement.Sqrt">
  17327. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17328. none exists it returns null.
  17329. </member>
  17330. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec.SecP384R1FieldElement.Sqrt">
  17331. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17332. none exists it returns null.
  17333. </member>
  17334. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec.SecP521R1FieldElement.Sqrt">
  17335. return a sqrt root - the routine verifies that the calculation returns the right value - if
  17336. none exists it returns null.
  17337. </member>
  17338. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECAlgorithms.ReferenceMultiply(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17339. Simple shift-and-add multiplication. Serves as reference implementation to verify (possibly
  17340. faster) implementations, and for very small scalars. CAUTION: This implementation is NOT
  17341. constant-time in any way. It is only intended to be used for diagnostics.
  17342. @param p
  17343. The point to multiply.
  17344. @param k
  17345. The multiplier.
  17346. @return The result of the point multiplication <code>kP</code>.
  17347. </member>
  17348. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve">
  17349. <remarks>Base class for an elliptic curve.</remarks>
  17350. </member>
  17351. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve.Precompute(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.IPreCompCallback)">
  17352. Compute a <code>PreCompInfo</code> for a point on this curve, under a given name. Used by
  17353. <code>ECMultiplier</code>s to save the precomputation for this <code>ECPoint</code> for use
  17354. by subsequent multiplication.
  17355. @param point
  17356. The <code>ECPoint</code> to store precomputations for.
  17357. @param name
  17358. A <code>String</code> used to index precomputations of different types.
  17359. @param callback
  17360. Called to calculate the <code>PreCompInfo</code>.
  17361. </member>
  17362. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve.NormalizeAll(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint[])">
  17363. Normalization ensures that any projective coordinate is 1, and therefore that the x, y
  17364. coordinates reflect those of the equivalent point in an affine coordinate system. Where more
  17365. than one point is to be normalized, this method will generally be more efficient than
  17366. normalizing each point separately.
  17367. @param points
  17368. An array of points that will be updated in place with their normalized versions,
  17369. where necessary
  17370. </member>
  17371. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve.NormalizeAll(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint[],System.Int32,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECFieldElement)">
  17372. Normalization ensures that any projective coordinate is 1, and therefore that the x, y
  17373. coordinates reflect those of the equivalent point in an affine coordinate system. Where more
  17374. than one point is to be normalized, this method will generally be more efficient than
  17375. normalizing each point separately. An (optional) z-scaling factor can be applied; effectively
  17376. each z coordinate is scaled by this value prior to normalization (but only one
  17377. actual multiplication is needed).
  17378. @param points
  17379. An array of points that will be updated in place with their normalized versions,
  17380. where necessary
  17381. @param off
  17382. The start of the range of points to normalize
  17383. @param len
  17384. The length of the range of points to normalize
  17385. @param iso
  17386. The (optional) z-scaling factor - can be null
  17387. </member>
  17388. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve.CreateCacheSafeLookupTable(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint[],System.Int32,System.Int32)">
  17389. Create a cache-safe lookup table for the specified sequence of points. All the points MUST
  17390. belong to this <code>ECCurve</code> instance, and MUST already be normalized.
  17391. </member>
  17392. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve.GetMultiplier">
  17393. Sets the default <code>ECMultiplier</code>, unless already set.
  17394. We avoid locking for performance reasons, so there is no uniqueness guarantee.
  17395. </member>
  17396. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECCurve.DecodePoint(System.Byte[])">
  17397. Decode a point on this curve from its ASN.1 encoding. The different
  17398. encodings are taken account of, including point compression for
  17399. <code>F<sub>p</sub></code> (X9.62 s 4.2.1 pg 17).
  17400. @return The decoded point.
  17401. </member>
  17402. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.FpCurve">
  17403. Elliptic curve over Fp
  17404. </member>
  17405. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mCurve.si">
  17406. The auxiliary values <code>s<sub>0</sub></code> and
  17407. <code>s<sub>1</sub></code> used for partial modular reduction for
  17408. Koblitz curves.
  17409. </member>
  17410. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mCurve.SolveQuadraticEquation(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECFieldElement)">
  17411. Solves a quadratic equation <code>z<sup>2</sup> + z = beta</code>(X9.62
  17412. D.1.6) The other solution is <code>z + 1</code>.
  17413. @param beta
  17414. The value to solve the quadratic equation for.
  17415. @return the solution for <code>z<sup>2</sup> + z = beta</code> or
  17416. <code>null</code> if no solution exists.
  17417. </member>
  17418. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mCurve.GetSi">
  17419. @return the auxiliary values <code>s<sub>0</sub></code> and
  17420. <code>s<sub>1</sub></code> used for partial modular reduction for
  17421. Koblitz curves.
  17422. </member>
  17423. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mCurve.IsKoblitz">
  17424. Returns true if this is a Koblitz curve (ABC curve).
  17425. @return true if this is a Koblitz curve (ABC curve), false otherwise
  17426. </member>
  17427. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mCurve">
  17428. Elliptic curves over F2m. The Weierstrass equation is given by
  17429. <code>y<sup>2</sup> + xy = x<sup>3</sup> + ax<sup>2</sup> + b</code>.
  17430. </member>
  17431. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mCurve.m">
  17432. The exponent <code>m</code> of <code>F<sub>2<sup>m</sup></sub></code>.
  17433. </member>
  17434. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mCurve.k1">
  17435. TPB: The integer <code>k</code> where <code>x<sup>m</sup> +
  17436. x<sup>k</sup> + 1</code> represents the reduction polynomial
  17437. <code>f(z)</code>.<br/>
  17438. PPB: The integer <code>k1</code> where <code>x<sup>m</sup> +
  17439. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17440. represents the reduction polynomial <code>f(z)</code>.<br/>
  17441. </member>
  17442. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mCurve.k2">
  17443. TPB: Always set to <code>0</code><br/>
  17444. PPB: The integer <code>k2</code> where <code>x<sup>m</sup> +
  17445. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17446. represents the reduction polynomial <code>f(z)</code>.<br/>
  17447. </member>
  17448. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mCurve.k3">
  17449. TPB: Always set to <code>0</code><br/>
  17450. PPB: The integer <code>k3</code> where <code>x<sup>m</sup> +
  17451. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17452. represents the reduction polynomial <code>f(z)</code>.<br/>
  17453. </member>
  17454. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mCurve.m_infinity">
  17455. The point at infinity on this curve.
  17456. </member>
  17457. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mCurve.#ctor(System.Int32,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17458. Constructor for Trinomial Polynomial Basis (TPB).
  17459. @param m The exponent <code>m</code> of
  17460. <code>F<sub>2<sup>m</sup></sub></code>.
  17461. @param k The integer <code>k</code> where <code>x<sup>m</sup> +
  17462. x<sup>k</sup> + 1</code> represents the reduction
  17463. polynomial <code>f(z)</code>.
  17464. @param a The coefficient <code>a</code> in the Weierstrass equation
  17465. for non-supersingular elliptic curves over
  17466. <code>F<sub>2<sup>m</sup></sub></code>.
  17467. @param b The coefficient <code>b</code> in the Weierstrass equation
  17468. for non-supersingular elliptic curves over
  17469. <code>F<sub>2<sup>m</sup></sub></code>.
  17470. </member>
  17471. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mCurve.#ctor(System.Int32,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17472. Constructor for Trinomial Polynomial Basis (TPB).
  17473. @param m The exponent <code>m</code> of
  17474. <code>F<sub>2<sup>m</sup></sub></code>.
  17475. @param k The integer <code>k</code> where <code>x<sup>m</sup> +
  17476. x<sup>k</sup> + 1</code> represents the reduction
  17477. polynomial <code>f(z)</code>.
  17478. @param a The coefficient <code>a</code> in the Weierstrass equation
  17479. for non-supersingular elliptic curves over
  17480. <code>F<sub>2<sup>m</sup></sub></code>.
  17481. @param b The coefficient <code>b</code> in the Weierstrass equation
  17482. for non-supersingular elliptic curves over
  17483. <code>F<sub>2<sup>m</sup></sub></code>.
  17484. @param order The order of the main subgroup of the elliptic curve.
  17485. @param cofactor The cofactor of the elliptic curve, i.e.
  17486. <code>#E<sub>a</sub>(F<sub>2<sup>m</sup></sub>) = h * n</code>.
  17487. </member>
  17488. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mCurve.#ctor(System.Int32,System.Int32,System.Int32,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17489. Constructor for Pentanomial Polynomial Basis (PPB).
  17490. @param m The exponent <code>m</code> of
  17491. <code>F<sub>2<sup>m</sup></sub></code>.
  17492. @param k1 The integer <code>k1</code> where <code>x<sup>m</sup> +
  17493. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17494. represents the reduction polynomial <code>f(z)</code>.
  17495. @param k2 The integer <code>k2</code> where <code>x<sup>m</sup> +
  17496. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17497. represents the reduction polynomial <code>f(z)</code>.
  17498. @param k3 The integer <code>k3</code> where <code>x<sup>m</sup> +
  17499. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17500. represents the reduction polynomial <code>f(z)</code>.
  17501. @param a The coefficient <code>a</code> in the Weierstrass equation
  17502. for non-supersingular elliptic curves over
  17503. <code>F<sub>2<sup>m</sup></sub></code>.
  17504. @param b The coefficient <code>b</code> in the Weierstrass equation
  17505. for non-supersingular elliptic curves over
  17506. <code>F<sub>2<sup>m</sup></sub></code>.
  17507. </member>
  17508. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mCurve.#ctor(System.Int32,System.Int32,System.Int32,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17509. Constructor for Pentanomial Polynomial Basis (PPB).
  17510. @param m The exponent <code>m</code> of
  17511. <code>F<sub>2<sup>m</sup></sub></code>.
  17512. @param k1 The integer <code>k1</code> where <code>x<sup>m</sup> +
  17513. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17514. represents the reduction polynomial <code>f(z)</code>.
  17515. @param k2 The integer <code>k2</code> where <code>x<sup>m</sup> +
  17516. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17517. represents the reduction polynomial <code>f(z)</code>.
  17518. @param k3 The integer <code>k3</code> where <code>x<sup>m</sup> +
  17519. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17520. represents the reduction polynomial <code>f(z)</code>.
  17521. @param a The coefficient <code>a</code> in the Weierstrass equation
  17522. for non-supersingular elliptic curves over
  17523. <code>F<sub>2<sup>m</sup></sub></code>.
  17524. @param b The coefficient <code>b</code> in the Weierstrass equation
  17525. for non-supersingular elliptic curves over
  17526. <code>F<sub>2<sup>m</sup></sub></code>.
  17527. @param order The order of the main subgroup of the elliptic curve.
  17528. @param cofactor The cofactor of the elliptic curve, i.e.
  17529. <code>#E<sub>a</sub>(F<sub>2<sup>m</sup></sub>) = h * n</code>.
  17530. </member>
  17531. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mCurve.IsTrinomial">
  17532. Return true if curve uses a Trinomial basis.
  17533. @return true if curve Trinomial, false otherwise.
  17534. </member>
  17535. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.FpFieldElement.FieldName">
  17536. return the field name for this field.
  17537. @return the string "Fp".
  17538. </member>
  17539. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.FpFieldElement.Sqrt">
  17540. return a sqrt root - the routine verifies that the calculation
  17541. returns the right value - if none exists it returns null.
  17542. </member>
  17543. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement">
  17544. Class representing the Elements of the finite field
  17545. <code>F<sub>2<sup>m</sup></sub></code> in polynomial basis (PB)
  17546. representation. Both trinomial (Tpb) and pentanomial (Ppb) polynomial
  17547. basis representations are supported. Gaussian normal basis (GNB)
  17548. representation is not supported.
  17549. </member>
  17550. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.Gnb">
  17551. Indicates gaussian normal basis representation (GNB). Number chosen
  17552. according to X9.62. GNB is not implemented at present.
  17553. </member>
  17554. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.Tpb">
  17555. Indicates trinomial basis representation (Tpb). Number chosen
  17556. according to X9.62.
  17557. </member>
  17558. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.Ppb">
  17559. Indicates pentanomial basis representation (Ppb). Number chosen
  17560. according to X9.62.
  17561. </member>
  17562. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.representation">
  17563. Tpb or Ppb.
  17564. </member>
  17565. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.m">
  17566. The exponent <code>m</code> of <code>F<sub>2<sup>m</sup></sub></code>.
  17567. </member>
  17568. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.x">
  17569. The <code>LongArray</code> holding the bits.
  17570. </member>
  17571. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.CheckFieldElements(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECFieldElement,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECFieldElement)">
  17572. Checks, if the ECFieldElements <code>a</code> and <code>b</code>
  17573. are elements of the same field <code>F<sub>2<sup>m</sup></sub></code>
  17574. (having the same representation).
  17575. @param a field element.
  17576. @param b field element to be compared.
  17577. @throws ArgumentException if <code>a</code> and <code>b</code>
  17578. are not elements of the same field
  17579. <code>F<sub>2<sup>m</sup></sub></code> (having the same
  17580. representation).
  17581. </member>
  17582. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.Representation">
  17583. @return the representation of the field
  17584. <code>F<sub>2<sup>m</sup></sub></code>, either of
  17585. {@link F2mFieldElement.Tpb} (trinomial
  17586. basis representation) or
  17587. {@link F2mFieldElement.Ppb} (pentanomial
  17588. basis representation).
  17589. </member>
  17590. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.M">
  17591. @return the degree <code>m</code> of the reduction polynomial
  17592. <code>f(z)</code>.
  17593. </member>
  17594. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.K1">
  17595. @return Tpb: The integer <code>k</code> where <code>x<sup>m</sup> +
  17596. x<sup>k</sup> + 1</code> represents the reduction polynomial
  17597. <code>f(z)</code>.<br/>
  17598. Ppb: The integer <code>k1</code> where <code>x<sup>m</sup> +
  17599. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17600. represents the reduction polynomial <code>f(z)</code>.<br/>
  17601. </member>
  17602. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.K2">
  17603. @return Tpb: Always returns <code>0</code><br/>
  17604. Ppb: The integer <code>k2</code> where <code>x<sup>m</sup> +
  17605. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17606. represents the reduction polynomial <code>f(z)</code>.<br/>
  17607. </member>
  17608. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mFieldElement.K3">
  17609. @return Tpb: Always set to <code>0</code><br/>
  17610. Ppb: The integer <code>k3</code> where <code>x<sup>m</sup> +
  17611. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  17612. represents the reduction polynomial <code>f(z)</code>.<br/>
  17613. </member>
  17614. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint">
  17615. base class for points on elliptic curves.
  17616. </member>
  17617. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint.AffineXCoord">
  17618. Returns the affine x-coordinate after checking that this point is normalized.
  17619. @return The affine x-coordinate of this point
  17620. @throws IllegalStateException if the point is not normalized
  17621. </member>
  17622. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint.AffineYCoord">
  17623. Returns the affine y-coordinate after checking that this point is normalized
  17624. @return The affine y-coordinate of this point
  17625. @throws IllegalStateException if the point is not normalized
  17626. </member>
  17627. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint.XCoord">
  17628. Returns the x-coordinate.
  17629. Caution: depending on the curve's coordinate system, this may not be the same value as in an
  17630. affine coordinate system; use Normalize() to get a point where the coordinates have their
  17631. affine values, or use AffineXCoord if you expect the point to already have been normalized.
  17632. @return the x-coordinate of this point
  17633. </member>
  17634. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint.YCoord">
  17635. Returns the y-coordinate.
  17636. Caution: depending on the curve's coordinate system, this may not be the same value as in an
  17637. affine coordinate system; use Normalize() to get a point where the coordinates have their
  17638. affine values, or use AffineYCoord if you expect the point to already have been normalized.
  17639. @return the y-coordinate of this point
  17640. </member>
  17641. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint.Normalize">
  17642. Normalization ensures that any projective coordinate is 1, and therefore that the x, y
  17643. coordinates reflect those of the equivalent point in an affine coordinate system.
  17644. @return a new ECPoint instance representing the same point, but with normalized coordinates
  17645. </member>
  17646. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPointBase.GetEncoded(System.Boolean)">
  17647. return the field element encoded with point compression. (S 4.3.6)
  17648. </member>
  17649. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPointBase.Multiply(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17650. Multiplies this <code>ECPoint</code> by the given number.
  17651. @param k The multiplicator.
  17652. @return <code>k * this</code>.
  17653. </member>
  17654. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.FpPoint">
  17655. Elliptic curve points over Fp
  17656. </member>
  17657. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.F2mPoint">
  17658. Elliptic curve points over F2m
  17659. </member>
  17660. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.ECMultiplier">
  17661. Interface for classes encapsulating a point multiplication algorithm
  17662. for <code>ECPoint</code>s.
  17663. </member>
  17664. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.ECMultiplier.Multiply(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17665. Multiplies the <code>ECPoint p</code> by <code>k</code>, i.e.
  17666. <code>p</code> is added <code>k</code> times to itself.
  17667. @param p The <code>ECPoint</code> to be multiplied.
  17668. @param k The factor by which <code>p</code> is multiplied.
  17669. @return <code>p</code> multiplied by <code>k</code>.
  17670. </member>
  17671. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.FixedPointPreCompInfo">
  17672. Class holding precomputation data for fixed-point multiplications.
  17673. </member>
  17674. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.FixedPointPreCompInfo.m_lookupTable">
  17675. Lookup table for the precomputed <code>ECPoint</code>s used for a fixed point multiplication.
  17676. </member>
  17677. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.FixedPointPreCompInfo.m_width">
  17678. The width used for the precomputation. If a larger width precomputation
  17679. is already available this may be larger than was requested, so calling
  17680. code should refer to the actual width.
  17681. </member>
  17682. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.PreCompInfo">
  17683. Interface for classes storing precomputation data for multiplication
  17684. algorithms. Used as a Memento (see GOF patterns) for
  17685. <code>WNafMultiplier</code>.
  17686. </member>
  17687. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WNafL2RMultiplier">
  17688. Class implementing the WNAF (Window Non-Adjacent Form) multiplication
  17689. algorithm.
  17690. </member>
  17691. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WNafL2RMultiplier.MultiplyPositive(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17692. Multiplies <code>this</code> by an integer <code>k</code> using the
  17693. Window NAF method.
  17694. @param k The integer by which <code>this</code> is multiplied.
  17695. @return A new <code>ECPoint</code> which equals <code>this</code>
  17696. multiplied by <code>k</code>.
  17697. </member>
  17698. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WNafPreCompInfo">
  17699. Class holding precomputation data for the WNAF (Window Non-Adjacent Form)
  17700. algorithm.
  17701. </member>
  17702. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WNafPreCompInfo.m_preComp">
  17703. Array holding the precomputed <code>ECPoint</code>s used for a Window
  17704. NAF multiplication.
  17705. </member>
  17706. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WNafPreCompInfo.m_preCompNeg">
  17707. Array holding the negations of the precomputed <code>ECPoint</code>s used
  17708. for a Window NAF multiplication.
  17709. </member>
  17710. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WNafPreCompInfo.m_twice">
  17711. Holds an <code>ECPoint</code> representing Twice(this). Used for the
  17712. Window NAF multiplication to create or extend the precomputed values.
  17713. </member>
  17714. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WNafUtilities.GenerateWindowNaf(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17715. Computes the Window NAF (non-adjacent Form) of an integer.
  17716. @param width The width <code>w</code> of the Window NAF. The width is
  17717. defined as the minimal number <code>w</code>, such that for any
  17718. <code>w</code> consecutive digits in the resulting representation, at
  17719. most one is non-zero.
  17720. @param k The integer of which the Window NAF is computed.
  17721. @return The Window NAF of the given width, such that the following holds:
  17722. <code>k = &amp;sum;<sub>i=0</sub><sup>l-1</sup> k<sub>i</sub>2<sup>i</sup>
  17723. </code>, where the <code>k<sub>i</sub></code> denote the elements of the
  17724. returned <code>byte[]</code>.
  17725. </member>
  17726. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WNafUtilities.GetWindowSize(System.Int32)">
  17727. Determine window width to use for a scalar multiplication of the given size.
  17728. @param bits the bit-length of the scalar to multiply by
  17729. @return the window size to use
  17730. </member>
  17731. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WNafUtilities.GetWindowSize(System.Int32,System.Int32)">
  17732. Determine window width to use for a scalar multiplication of the given size.
  17733. @param bits the bit-length of the scalar to multiply by
  17734. @param maxWidth the maximum window width to return
  17735. @return the window size to use
  17736. </member>
  17737. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WNafUtilities.GetWindowSize(System.Int32,System.Int32[])">
  17738. Determine window width to use for a scalar multiplication of the given size.
  17739. @param bits the bit-length of the scalar to multiply by
  17740. @param windowSizeCutoffs a monotonically increasing list of bit sizes at which to increment the window width
  17741. @return the window size to use
  17742. </member>
  17743. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WNafUtilities.GetWindowSize(System.Int32,System.Int32[],System.Int32)">
  17744. Determine window width to use for a scalar multiplication of the given size.
  17745. @param bits the bit-length of the scalar to multiply by
  17746. @param windowSizeCutoffs a monotonically increasing list of bit sizes at which to increment the window width
  17747. @param maxWidth the maximum window width to return
  17748. @return the window size to use
  17749. </member>
  17750. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WTauNafMultiplier">
  17751. Class implementing the WTNAF (Window
  17752. <code>&#964;</code>-adic Non-Adjacent Form) algorithm.
  17753. </member>
  17754. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WTauNafMultiplier.MultiplyPositive(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17755. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  17756. by <code>k</code> using the reduced <code>&#964;</code>-adic NAF (RTNAF)
  17757. method.
  17758. @param p The AbstractF2mPoint to multiply.
  17759. @param k The integer by which to multiply <code>k</code>.
  17760. @return <code>p</code> multiplied by <code>k</code>.
  17761. </member>
  17762. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WTauNafMultiplier.MultiplyWTnaf(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mPoint,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc.ZTauElement,System.SByte,System.SByte)">
  17763. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  17764. by an element <code>&#955;</code> of <code><b>Z</b>[&#964;]</code> using
  17765. the <code>&#964;</code>-adic NAF (TNAF) method.
  17766. @param p The AbstractF2mPoint to multiply.
  17767. @param lambda The element <code>&#955;</code> of
  17768. <code><b>Z</b>[&#964;]</code> of which to compute the
  17769. <code>[&#964;]</code>-adic NAF.
  17770. @return <code>p</code> multiplied by <code>&#955;</code>.
  17771. </member>
  17772. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WTauNafMultiplier.MultiplyFromWTnaf(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.AbstractF2mPoint,System.SByte[])">
  17773. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  17774. by an element <code>&#955;</code> of <code><b>Z</b>[&#964;]</code>
  17775. using the window <code>&#964;</code>-adic NAF (TNAF) method, given the
  17776. WTNAF of <code>&#955;</code>.
  17777. @param p The AbstractF2mPoint to multiply.
  17778. @param u The the WTNAF of <code>&#955;</code>..
  17779. @return <code>&#955; * p</code>
  17780. </member>
  17781. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WTauNafPreCompInfo">
  17782. Class holding precomputation data for the WTNAF (Window
  17783. <code>&#964;</code>-adic Non-Adjacent Form) algorithm.
  17784. </member>
  17785. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier.WTauNafPreCompInfo.m_preComp">
  17786. Array holding the precomputed <code>AbstractF2mPoint</code>s used for the
  17787. WTNAF multiplication in <code>
  17788. {@link org.bouncycastle.math.ec.multiplier.WTauNafMultiplier.multiply()
  17789. WTauNafMultiplier.multiply()}</code>.
  17790. </member>
  17791. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032.Ed25519">
  17792. <summary>
  17793. A low-level implementation of the Ed25519, Ed25519ctx, and Ed25519ph instantiations of the Edwards-Curve Digital
  17794. Signature Algorithm specified in <a href="https://www.rfc-editor.org/rfc/rfc8032">RFC 8032</a>.
  17795. </summary>
  17796. <remarks>
  17797. The implementation strategy is mostly drawn from <a href="https://ia.cr/2012/309">
  17798. Mike Hamburg, "Fast and compact elliptic-curve cryptography"</a>, notably the "signed multi-comb" algorithm (for
  17799. scalar multiplication by a fixed point), the "half Niels coordinates" (for precomputed points), and the
  17800. "extensible coordinates" (for accumulators). Standard
  17801. <a href="https://hyperelliptic.org/EFD/g1p/auto-twisted-extended.html">extended coordinates</a> are used during
  17802. precomputations, needing only a single extra point addition formula.
  17803. </remarks>
  17804. </member>
  17805. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032.Ed448">
  17806. <summary>
  17807. A low-level implementation of the Ed448 and Ed448ph instantiations of the Edwards-Curve Digital Signature
  17808. Algorithm specified in <a href="https://www.rfc-editor.org/rfc/rfc8032">RFC 8032</a>.
  17809. </summary>
  17810. <remarks>
  17811. The implementation uses the "signed mult-comb" algorithm (for scalar multiplication by a fixed point) from
  17812. <a href="https://ia.cr/2012/309">Mike Hamburg, "Fast and compact elliptic-curve cryptography"</a>. Standard
  17813. <a href="https://hyperelliptic.org/EFD/g1p/auto-edwards-projective.html">projective coordinates</a> are used
  17814. for most point arithmetic.
  17815. </remarks>
  17816. </member>
  17817. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes">
  17818. <summary>Utility methods for generating primes and testing for primality.</summary>
  17819. </member>
  17820. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.MROutput">
  17821. <summary>Used to return the output from the
  17822. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.EnhancedMRProbablePrimeTest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom,System.Int32)">
  17823. Enhanced Miller-Rabin Probabilistic Primality Test</see></summary>
  17824. </member>
  17825. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.STOutput">
  17826. <summary>Used to return the output from the <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.GenerateSTRandomPrime(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.Int32,System.Byte[])">
  17827. Shawe-Taylor Random_Prime Routine</see></summary>
  17828. </member>
  17829. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.GenerateSTRandomPrime(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest,System.Int32,System.Byte[])">
  17830. <summary>FIPS 186-4 C.6 Shawe-Taylor Random_Prime Routine.</summary>
  17831. <remarks>Construct a provable prime number using a hash function.</remarks>
  17832. <param name="hash">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest"/> instance to use (as "Hash()"). Cannot be null.</param>
  17833. <param name="length">The length (in bits) of the prime to be generated. Must be at least 2.</param>
  17834. <param name="inputSeed">The seed to be used for the generation of the requested prime. Cannot be null or
  17835. empty.</param>
  17836. <returns>An <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.STOutput"/> instance containing the requested prime.</returns>
  17837. </member>
  17838. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.EnhancedMRProbablePrimeTest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom,System.Int32)">
  17839. <summary>FIPS 186-4 C.3.2 Enhanced Miller-Rabin Probabilistic Primality Test.</summary>
  17840. <remarks>
  17841. Run several iterations of the Miller-Rabin algorithm with randomly-chosen bases. This is an alternative to
  17842. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.IsMRProbablePrime(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom,System.Int32)"/> that provides more information about a
  17843. composite candidate, which may be useful when generating or validating RSA moduli.
  17844. </remarks>
  17845. <param name="candidate">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger"/> instance to test for primality.</param>
  17846. <param name="random">The source of randomness to use to choose bases.</param>
  17847. <param name="iterations">The number of randomly-chosen bases to perform the test for.</param>
  17848. <returns>An <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.MROutput"/> instance that can be further queried for details.</returns>
  17849. </member>
  17850. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.HasAnySmallFactors(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17851. <summary>A fast check for small divisors, up to some implementation-specific limit.</summary>
  17852. <param name="candidate">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger"/> instance to test for division by small factors.</param>
  17853. <returns><c>true</c> if the candidate is found to have any small factors, <c>false</c> otherwise.</returns>
  17854. </member>
  17855. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.IsMRProbablePrime(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom,System.Int32)">
  17856. <summary>FIPS 186-4 C.3.1 Miller-Rabin Probabilistic Primality Test.</summary>
  17857. <remarks>Run several iterations of the Miller-Rabin algorithm with randomly-chosen bases.</remarks>
  17858. <param name="candidate">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger"/> instance to test for primality.</param>
  17859. <param name="random">The source of randomness to use to choose bases.</param>
  17860. <param name="iterations">The number of randomly-chosen bases to perform the test for.</param>
  17861. <returns>
  17862. <c>false</c> if any witness to compositeness is found amongst the chosen bases (so
  17863. <paramref name="candidate"/> is definitely NOT prime), or else <c>true</c> (indicating primality with some
  17864. probability dependent on the number of iterations that were performed).
  17865. </returns>
  17866. </member>
  17867. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Primes.IsMRProbablePrimeToBase(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17868. <summary>FIPS 186-4 C.3.1 Miller-Rabin Probabilistic Primality Test (to a fixed base).</summary>
  17869. <remarks>Run a single iteration of the Miller-Rabin algorithm against the specified base.</remarks>
  17870. <param name="candidate">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger"/> instance to test for primality.</param>
  17871. <param name="baseValue">The base value to use for this iteration.</param>
  17872. <returns><c>false</c> if <paramref name="baseValue"/> is a witness to compositeness (so
  17873. <paramref name="candidate"/> is definitely NOT prime), or else <c>true</c>.</returns>
  17874. </member>
  17875. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspResp">
  17876. <remarks>
  17877. <code>
  17878. BasicOcspResponse ::= SEQUENCE {
  17879. tbsResponseData ResponseData,
  17880. signatureAlgorithm AlgorithmIdentifier,
  17881. signature BIT STRING,
  17882. certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL
  17883. }
  17884. </code>
  17885. </remarks>
  17886. </member>
  17887. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspResp.GetTbsResponseData">
  17888. <returns>The DER encoding of the tbsResponseData field.</returns>
  17889. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspException">In the event of an encoding error.</exception>
  17890. </member>
  17891. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspResp.GetCertificates">
  17892. <returns>The certificates, if any, associated with the response.</returns>
  17893. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspException">In the event of an encoding error.</exception>
  17894. </member>
  17895. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspResp.Verify(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  17896. <summary>
  17897. Verify the signature against the tbsResponseData object we contain.
  17898. </summary>
  17899. </member>
  17900. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspResp.GetEncoded">
  17901. <returns>The ASN.1 encoded representation of this object.</returns>
  17902. </member>
  17903. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspRespGenerator">
  17904. Generator for basic OCSP response objects.
  17905. </member>
  17906. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.RespID)">
  17907. basic constructor
  17908. </member>
  17909. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  17910. construct with the responderID to be the SHA-1 keyHash of the passed in public key.
  17911. </member>
  17912. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.AddResponse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateID,Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateStatus)">
  17913. Add a response for a particular Certificate ID.
  17914. @param certID certificate ID details
  17915. @param certStatus status of the certificate - null if okay
  17916. </member>
  17917. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.AddResponse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateID,Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateStatus,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions)">
  17918. Add a response for a particular Certificate ID.
  17919. @param certID certificate ID details
  17920. @param certStatus status of the certificate - null if okay
  17921. @param singleExtensions optional extensions
  17922. </member>
  17923. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.AddResponse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateID,Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateStatus,System.Nullable{System.DateTime},Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions)">
  17924. Add a response for a particular Certificate ID.
  17925. @param certID certificate ID details
  17926. @param nextUpdate date when next update should be requested
  17927. @param certStatus status of the certificate - null if okay
  17928. @param singleExtensions optional extensions
  17929. </member>
  17930. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.AddResponse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateID,Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateStatus,System.DateTime,System.Nullable{System.DateTime},Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions)">
  17931. Add a response for a particular Certificate ID.
  17932. @param certID certificate ID details
  17933. @param thisUpdate date this response was valid on
  17934. @param nextUpdate date when next update should be requested
  17935. @param certStatus status of the certificate - null if okay
  17936. @param singleExtensions optional extensions
  17937. </member>
  17938. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.SetResponseExtensions(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions)">
  17939. Set the extensions for the response.
  17940. @param responseExtensions the extension object to carry.
  17941. </member>
  17942. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate[],System.DateTime)">
  17943. <summary>
  17944. Generate the signed response using the passed in signature calculator.
  17945. </summary>
  17946. <param name="signatureCalculatorFactory">Implementation of signing calculator factory.</param>
  17947. <param name="chain">The certificate chain associated with the response signer.</param>
  17948. <param name="producedAt">"produced at" date.</param>
  17949. <returns></returns>
  17950. </member>
  17951. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.SignatureAlgNames">
  17952. Return an IEnumerable of the signature names supported by the generator.
  17953. @return an IEnumerable containing recognised names.
  17954. </member>
  17955. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateID.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17956. create from an issuer certificate and the serial number of the
  17957. certificate it signed.
  17958. @exception OcspException if any problems occur creating the id fields.
  17959. </member>
  17960. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateID.SerialNumber">
  17961. return the serial number for the certificate associated
  17962. with this request.
  17963. </member>
  17964. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateID.DeriveCertificateID(Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateID,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  17965. Create a new CertificateID for a new serial number derived from a previous one
  17966. calculated for the same CA certificate.
  17967. @param original the previously calculated CertificateID for the CA.
  17968. @param newSerialNumber the serial number for the new certificate of interest.
  17969. @return a new CertificateID for newSerialNumber
  17970. </member>
  17971. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReq">
  17972. <pre>
  17973. OcspRequest ::= SEQUENCE {
  17974. tbsRequest TBSRequest,
  17975. optionalSignature [0] EXPLICIT Signature OPTIONAL }
  17976. TBSRequest ::= SEQUENCE {
  17977. version [0] EXPLICIT Version DEFAULT v1,
  17978. requestorName [1] EXPLICIT GeneralName OPTIONAL,
  17979. requestList SEQUENCE OF Request,
  17980. requestExtensions [2] EXPLICIT Extensions OPTIONAL }
  17981. Signature ::= SEQUENCE {
  17982. signatureAlgorithm AlgorithmIdentifier,
  17983. signature BIT STRING,
  17984. certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL}
  17985. Version ::= INTEGER { v1(0) }
  17986. Request ::= SEQUENCE {
  17987. reqCert CertID,
  17988. singleRequestExtensions [0] EXPLICIT Extensions OPTIONAL }
  17989. CertID ::= SEQUENCE {
  17990. hashAlgorithm AlgorithmIdentifier,
  17991. issuerNameHash OCTET STRING, -- Hash of Issuer's DN
  17992. issuerKeyHash OCTET STRING, -- Hash of Issuers public key
  17993. serialNumber CertificateSerialNumber }
  17994. </pre>
  17995. </member>
  17996. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReq.GetTbsRequest">
  17997. Return the DER encoding of the tbsRequest field.
  17998. @return DER encoding of tbsRequest
  17999. @throws OcspException in the event of an encoding error.
  18000. </member>
  18001. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReq.SignatureAlgOid">
  18002. return the object identifier representing the signature algorithm
  18003. </member>
  18004. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReq.GetCertificates">
  18005. If the request is signed return a possibly empty CertStore containing the certificates in the
  18006. request. If the request is not signed the method returns null.
  18007. @return null if not signed, a CertStore otherwise
  18008. @throws OcspException
  18009. </member>
  18010. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReq.IsSigned">
  18011. Return whether or not this request is signed.
  18012. @return true if signed false otherwise.
  18013. </member>
  18014. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReq.Verify(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  18015. Verify the signature against the TBSRequest object we contain.
  18016. </member>
  18017. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReq.GetEncoded">
  18018. return the ASN.1 encoded representation of this object.
  18019. </member>
  18020. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReqGenerator.AddRequest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateID)">
  18021. Add a request for the given CertificateID.
  18022. @param certId certificate ID of interest
  18023. </member>
  18024. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReqGenerator.AddRequest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.CertificateID,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions)">
  18025. Add a request with extensions
  18026. @param certId certificate ID of interest
  18027. @param singleRequestExtensions the extensions to attach to the request
  18028. </member>
  18029. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReqGenerator.SetRequestorName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name)">
  18030. Set the requestor name to the passed in X509Principal
  18031. @param requestorName a X509Principal representing the requestor name.
  18032. </member>
  18033. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReqGenerator.Generate">
  18034. Generate an unsigned request
  18035. @return the OcspReq
  18036. @throws OcspException
  18037. </member>
  18038. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspReqGenerator.SignatureAlgNames">
  18039. Return an IEnumerable of the signature names supported by the generator.
  18040. @return an IEnumerable containing recognised names.
  18041. </member>
  18042. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspResp.GetEncoded">
  18043. return the ASN.1 encoded representation of this object.
  18044. </member>
  18045. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OCSPRespGenerator">
  18046. base generator for an OCSP response - at the moment this only supports the
  18047. generation of responses containing BasicOCSP responses.
  18048. </member>
  18049. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.OcspRespStatus.Successful">
  18050. note 4 is not used.
  18051. </member>
  18052. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.RespID">
  18053. Carrier for a ResponderID.
  18054. </member>
  18055. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.RevokedStatus">
  18056. <summary>Wrapper for the RevokedInfo object</summary>
  18057. </member>
  18058. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.RevokedStatus.RevocationReason">
  18059. <summary>Return the revocation reason, if there is one.</summary>
  18060. <remarks>This field is optional; test for it with <see cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.RevokedStatus.HasRevocationReason"/> first.</remarks>
  18061. <returns>The revocation reason, if available.</returns>
  18062. <exception cref="T:System.InvalidOperationException">If no revocation reason is available.</exception>
  18063. </member>
  18064. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.SingleResp.GetCertStatus">
  18065. Return the status object for the response - null indicates good.
  18066. @return the status object for the response, null if it is good.
  18067. </member>
  18068. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.SingleResp.NextUpdate">
  18069. return the NextUpdate value - note: this is an optional field so may
  18070. be returned as null.
  18071. @return nextUpdate, or null if not present.
  18072. </member>
  18073. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp.UnknownStatus">
  18074. wrapper for the UnknownInfo object
  18075. </member>
  18076. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.AgreementUtilities">
  18077. <remarks>
  18078. Utility class for creating IBasicAgreement objects from their names/Oids
  18079. </remarks>
  18080. </member>
  18081. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.CipherUtilities">
  18082. <remarks>
  18083. Cipher Utility class contains methods that can not be specifically grouped into other classes.
  18084. </remarks>
  18085. </member>
  18086. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.DigestUtilities">
  18087. <remarks>
  18088. Utility class for creating IDigest objects from their names/Oids
  18089. </remarks>
  18090. </member>
  18091. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.DigestUtilities.GetObjectIdentifier(System.String)">
  18092. <summary>
  18093. Returns a ObjectIdentifier for a given digest mechanism.
  18094. </summary>
  18095. <param name="mechanism">A string representation of the digest meanism.</param>
  18096. <returns>A DerObjectIdentifier, null if the Oid is not available.</returns>
  18097. </member>
  18098. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.DotNetUtilities">
  18099. <summary>
  18100. A class containing methods to interface the BouncyCastle world to the .NET Crypto world.
  18101. </summary>
  18102. </member>
  18103. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.DotNetUtilities.ToX509Certificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509CertificateStructure)">
  18104. <summary>
  18105. Create an System.Security.Cryptography.X509Certificate from an X509Certificate Structure.
  18106. </summary>
  18107. <param name="x509Struct"></param>
  18108. <returns>A System.Security.Cryptography.X509Certificate.</returns>
  18109. </member>
  18110. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.JksStore.Probe(System.IO.Stream)">
  18111. <exception cref="T:System.IO.IOException"/>
  18112. </member>
  18113. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.JksStore.GetKey(System.String,System.Char[])">
  18114. <exception cref="T:System.IO.IOException"/>
  18115. </member>
  18116. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.JksStore.SetKeyEntry(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Char[],Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate[])">
  18117. <exception cref="T:System.IO.IOException"/>
  18118. </member>
  18119. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.JksStore.SetKeyEntry(System.String,System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate[])">
  18120. <exception cref="T:System.IO.IOException"/>
  18121. </member>
  18122. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.JksStore.SetCertificateEntry(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  18123. <exception cref="T:System.IO.IOException"/>
  18124. </member>
  18125. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.JksStore.Save(System.IO.Stream,System.Char[])">
  18126. <exception cref="T:System.IO.IOException"/>
  18127. </member>
  18128. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.JksStore.Load(System.IO.Stream,System.Char[])">
  18129. <exception cref="T:System.IO.IOException"/>
  18130. </member>
  18131. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.JksStore.ValidateStream(System.IO.Stream,System.Char[])">
  18132. <exception cref="T:System.IO.IOException"/>
  18133. </member>
  18134. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.JksStore.JksTrustedCertEntry">
  18135. JksTrustedCertEntry is a internal container for the certificate entry.
  18136. </member>
  18137. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.MacUtilities">
  18138. <remarks>
  18139. Utility class for creating HMac object from their names/Oids
  18140. </remarks>
  18141. </member>
  18142. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.PbeUtilities">
  18143. <summary>
  18144. </summary>
  18145. </member>
  18146. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.PbeUtilities.GetObjectIdentifier(System.String)">
  18147. <summary>
  18148. Returns a ObjectIdentifier for a give encoding.
  18149. </summary>
  18150. <param name="mechanism">A string representation of the encoding.</param>
  18151. <returns>A DerObjectIdentifier, null if the Oid is not available.</returns>
  18152. </member>
  18153. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom.GetInstance(System.String)">
  18154. <summary>
  18155. Create and auto-seed an instance based on the given algorithm.
  18156. </summary>
  18157. <remarks>Equivalent to GetInstance(algorithm, true)</remarks>
  18158. <param name="algorithm">e.g. "SHA256PRNG"</param>
  18159. </member>
  18160. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom.GetInstance(System.String,System.Boolean)">
  18161. <summary>
  18162. Create an instance based on the given algorithm, with optional auto-seeding
  18163. </summary>
  18164. <param name="algorithm">e.g. "SHA256PRNG"</param>
  18165. <param name="autoSeed">If true, the instance will be auto-seeded.</param>
  18166. </member>
  18167. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.IRandomGenerator)">
  18168. <summary>Use the specified instance of IRandomGenerator as random source.</summary>
  18169. <remarks>
  18170. This constructor performs no seeding of either the <c>IRandomGenerator</c> or the
  18171. constructed <c>SecureRandom</c>. It is the responsibility of the client to provide
  18172. proper seed material as necessary/appropriate for the given <c>IRandomGenerator</c>
  18173. implementation.
  18174. </remarks>
  18175. <param name="generator">The source to generate all random bytes from.</param>
  18176. </member>
  18177. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SignerUtilities">
  18178. <summary>
  18179. Signer Utility class contains methods that can not be specifically grouped into other classes.
  18180. </summary>
  18181. </member>
  18182. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SignerUtilities.GetObjectIdentifier(System.String)">
  18183. <summary>
  18184. Returns an ObjectIdentifier for a given encoding.
  18185. </summary>
  18186. <param name="mechanism">A string representation of the encoding.</param>
  18187. <returns>A DerObjectIdentifier, null if the OID is not available.</returns>
  18188. </member>
  18189. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.WrapperUtilities">
  18190. <remarks>
  18191. Utility class for creating IWrapper objects from their names/Oids
  18192. </remarks>
  18193. </member>
  18194. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.MiscPemGenerator">
  18195. PEM generator for the original set of PEM objects used in Open SSL.
  18196. </member>
  18197. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.PemReader">
  18198. Class for reading OpenSSL PEM encoded streams containing
  18199. X509 certificates, PKCS8 encoded keys and PKCS7 objects.
  18200. <p>
  18201. In the case of PKCS7 objects the reader will return a CMS ContentInfo object. Keys and
  18202. Certificates will be returned using the appropriate java.security type.</p>
  18203. </member>
  18204. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.PemReader.#ctor(System.IO.TextReader)">
  18205. Create a new PemReader
  18206. @param reader the Reader
  18207. </member>
  18208. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.PemReader.#ctor(System.IO.TextReader,Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.IPasswordFinder)">
  18209. Create a new PemReader with a password finder
  18210. @param reader the Reader
  18211. @param pFinder the password finder
  18212. </member>
  18213. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.PemReader.ReadCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  18214. Reads in a X509Certificate.
  18215. @return the X509Certificate
  18216. @throws IOException if an I/O error occured
  18217. </member>
  18218. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.PemReader.ReadCrl(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  18219. Reads in a X509CRL.
  18220. @return the X509Certificate
  18221. @throws IOException if an I/O error occured
  18222. </member>
  18223. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.PemReader.ReadCertificateRequest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  18224. Reads in a PKCS10 certification request.
  18225. @return the certificate request.
  18226. @throws IOException if an I/O error occured
  18227. </member>
  18228. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.PemReader.ReadAttributeCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  18229. Reads in a X509 Attribute Certificate.
  18230. @return the X509 Attribute Certificate
  18231. @throws IOException if an I/O error occured
  18232. </member>
  18233. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.PemReader.ReadPkcs7(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  18234. Reads in a PKCS7 object. This returns a ContentInfo object suitable for use with the CMS
  18235. API.
  18236. @return the X509Certificate
  18237. @throws IOException if an I/O error occured
  18238. </member>
  18239. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.PemReader.ReadPrivateKey(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  18240. Read a Key Pair
  18241. </member>
  18242. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.PemWriter">
  18243. <remarks>General purpose writer for OpenSSL PEM objects.</remarks>
  18244. </member>
  18245. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.PemWriter.#ctor(System.IO.TextWriter)">
  18246. <param name="writer">The TextWriter object to write the output to.</param>
  18247. </member>
  18248. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.Pkcs8Generator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  18249. Constructor for an unencrypted private key PEM object.
  18250. @param key private key to be encoded.
  18251. </member>
  18252. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl.Pkcs8Generator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.String)">
  18253. Constructor for an encrypted private key PEM object.
  18254. @param key private key to be encoded
  18255. @param algorithm encryption algorithm to use
  18256. @param provider provider to use
  18257. @throws NoSuchAlgorithmException if algorithm/mode cannot be found
  18258. </member>
  18259. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest">
  18260. <remarks>
  18261. A class for verifying and creating Pkcs10 Certification requests.
  18262. </remarks>
  18263. <code>
  18264. CertificationRequest ::= Sequence {
  18265. certificationRequestInfo CertificationRequestInfo,
  18266. signatureAlgorithm AlgorithmIdentifier{{ SignatureAlgorithms }},
  18267. signature BIT STRING
  18268. }
  18269. CertificationRequestInfo ::= Sequence {
  18270. version Integer { v1(0) } (v1,...),
  18271. subject Name,
  18272. subjectPKInfo SubjectPublicKeyInfo{{ PKInfoAlgorithms }},
  18273. attributes [0] Attributes{{ CRIAttributes }}
  18274. }
  18275. Attributes { ATTRIBUTE:IOSet } ::= Set OF Attr{{ IOSet }}
  18276. Attr { ATTRIBUTE:IOSet } ::= Sequence {
  18277. type ATTRIBUTE.&amp;id({IOSet}),
  18278. values Set SIZE(1..MAX) OF ATTRIBUTE.&amp;Type({IOSet}{\@type})
  18279. }
  18280. </code>
  18281. see <a href="http://www.rsasecurity.com/rsalabs/node.asp?id=2132"/>
  18282. </member>
  18283. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Set,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  18284. <summary>
  18285. Instantiate a Pkcs10CertificationRequest object with the necessary credentials.
  18286. </summary>
  18287. <param name="signatureAlgorithm">Name of Sig Alg.</param>
  18288. <param name="subject">X509Name of subject eg OU="My unit." O="My Organisatioin" C="au" </param>
  18289. <param name="publicKey">Public Key to be included in cert reqest.</param>
  18290. <param name="attributes">ASN1Set of Attributes.</param>
  18291. <param name="signingKey">Matching Private key for nominated (above) public key to be used to sign the request.</param>
  18292. </member>
  18293. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Set)">
  18294. <summary>
  18295. Instantiate a Pkcs10CertificationRequest object with the necessary credentials.
  18296. </summary>
  18297. <param name="signatureFactory">The factory for signature calculators to sign the PKCS#10 request with.</param>
  18298. <param name="subject">X509Name of subject eg OU="My unit." O="My Organisatioin" C="au" </param>
  18299. <param name="publicKey">Public Key to be included in cert reqest.</param>
  18300. <param name="attributes">ASN1Set of Attributes.</param>
  18301. </member>
  18302. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest.GetPublicKey">
  18303. <summary>
  18304. Get the public key.
  18305. </summary>
  18306. <returns>The public key.</returns>
  18307. </member>
  18308. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest.Verify">
  18309. <summary>
  18310. Verify Pkcs10 Cert Request is valid.
  18311. </summary>
  18312. <returns>true = valid.</returns>
  18313. </member>
  18314. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest.GetRequestedExtensions">
  18315. <summary>
  18316. Returns X509Extensions if the Extensions Request attribute can be found and returns the extensions block.
  18317. </summary>
  18318. <returns>X509Extensions block or null if one cannot be found.</returns>
  18319. </member>
  18320. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs10CertificationRequestDelaySigned">
  18321. <remarks>
  18322. A class for creating and verifying Pkcs10 Certification requests (this is an extension on <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest"/>).
  18323. The requests are made using delay signing. This is useful for situations where
  18324. the private key is in another environment and not directly accessible (e.g. HSM)
  18325. So the first step creates the request, then the signing is done outside this
  18326. object and the signature is then used to complete the request.
  18327. </remarks>
  18328. <code>
  18329. CertificationRequest ::= Sequence {
  18330. certificationRequestInfo CertificationRequestInfo,
  18331. signatureAlgorithm AlgorithmIdentifier{{ SignatureAlgorithms }},
  18332. signature BIT STRING
  18333. }
  18334. CertificationRequestInfo ::= Sequence {
  18335. version Integer { v1(0) } (v1,...),
  18336. subject Name,
  18337. subjectPKInfo SubjectPublicKeyInfo{{ PKInfoAlgorithms }},
  18338. attributes [0] Attributes{{ CRIAttributes }}
  18339. }
  18340. Attributes { ATTRIBUTE:IOSet } ::= Set OF Attr{{ IOSet }}
  18341. Attr { ATTRIBUTE:IOSet } ::= Sequence {
  18342. type ATTRIBUTE.&amp;id({IOSet}),
  18343. values Set SIZE(1..MAX) OF ATTRIBUTE.&amp;Type({IOSet}{\@type})
  18344. }
  18345. </code>
  18346. see <a href="http://www.rsasecurity.com/rsalabs/node.asp?id=2132"/>
  18347. </member>
  18348. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs10CertificationRequestDelaySigned.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Set)">
  18349. <summary>
  18350. Instantiate a Pkcs10CertificationRequest object with the necessary credentials.
  18351. </summary>
  18352. <param name="signatureAlgorithm">Name of Sig Alg.</param>
  18353. <param name="subject">X509Name of subject eg OU="My unit." O="My Organisatioin" C="au" </param>
  18354. <param name="publicKey">Public Key to be included in cert reqest.</param>
  18355. <param name="attributes">ASN1Set of Attributes.</param>
  18356. <remarks>
  18357. After the object is constructed use the <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs10CertificationRequestDelaySigned.GetDataToSign"/> and finally the
  18358. SignRequest methods to finalize the request.
  18359. </remarks>
  18360. </member>
  18361. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs12Store.GetCertificate(System.String)">
  18362. simply return the cert entry for the private key
  18363. </member>
  18364. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs12Utilities">
  18365. Utility class for reencoding PKCS#12 files to definite length.
  18366. </member>
  18367. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs12Utilities.ConvertToDefiniteLength(System.Byte[])">
  18368. Just re-encode the outer layer of the PKCS#12 file to definite length encoding.
  18369. @param berPKCS12File - original PKCS#12 file
  18370. @return a byte array representing the DER encoding of the PFX structure
  18371. @throws IOException
  18372. </member>
  18373. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs12Utilities.ConvertToDefiniteLength(System.Byte[],System.Char[])">
  18374. Re-encode the PKCS#12 structure to definite length encoding at the inner layer
  18375. as well, recomputing the MAC accordingly.
  18376. @param berPKCS12File - original PKCS12 file.
  18377. @param provider - provider to use for MAC calculation.
  18378. @return a byte array representing the DER encoding of the PFX structure.
  18379. @throws IOException on parsing, encoding errors.
  18380. </member>
  18381. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo">
  18382. <summary>
  18383. A holding class for a PKCS#8 encrypted private key info object that allows for its decryption.
  18384. </summary>
  18385. </member>
  18386. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs.EncryptedPrivateKeyInfo)">
  18387. <summary>
  18388. Base constructor from a PKCS#8 EncryptedPrivateKeyInfo object.
  18389. </summary>
  18390. <param name="encryptedPrivateKeyInfo">A PKCS#8 EncryptedPrivateKeyInfo object.</param>
  18391. </member>
  18392. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.#ctor(System.Byte[])">
  18393. <summary>
  18394. Base constructor from a BER encoding of a PKCS#8 EncryptedPrivateKeyInfo object.
  18395. </summary>
  18396. <param name="encryptedPrivateKeyInfo">A BER encoding of a PKCS#8 EncryptedPrivateKeyInfo objects.</param>
  18397. </member>
  18398. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.ToAsn1Structure">
  18399. <summary>
  18400. Returns the underlying ASN.1 structure inside this object.
  18401. </summary>
  18402. <returns>Return the EncryptedPrivateKeyInfo structure in this object.</returns>
  18403. </member>
  18404. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.GetEncryptedData">
  18405. <summary>
  18406. Returns a copy of the encrypted data in this structure.
  18407. </summary>
  18408. <returns>Return a copy of the encrypted data in this object.</returns>
  18409. </member>
  18410. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.GetEncoded">
  18411. <summary>
  18412. Return a binary ASN.1 encoding of the EncryptedPrivateKeyInfo structure in this object.
  18413. </summary>
  18414. <returns>A byte array containing the encoded object.</returns>
  18415. </member>
  18416. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.DecryptPrivateKeyInfo(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDecryptorBuilderProvider)">
  18417. <summary>
  18418. Get a decryptor from the passed in provider and decrypt the encrypted private key info, returning the result.
  18419. </summary>
  18420. <param name="inputDecryptorProvider">A provider to query for decryptors for the object.</param>
  18421. <returns>The decrypted private key info structure.</returns>
  18422. </member>
  18423. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfoBuilder.Build(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherBuilder)">
  18424. <summary>
  18425. Create the encrypted private key info using the passed in encryptor.
  18426. </summary>
  18427. <param name="encryptor">The encryptor to use.</param>
  18428. <returns>An encrypted private key info containing the original private key info.</returns>
  18429. </member>
  18430. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.PkcsException">
  18431. <summary>Base exception for PKCS related issues.</summary>
  18432. </member>
  18433. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.PkcsIOException">
  18434. <summary>Base exception for parsing related issues in the PKCS namespace.</summary>
  18435. </member>
  18436. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs.PrivateKeyInfoFactory.CreatePrivateKeyInfo(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Set)">
  18437. Create a PrivateKeyInfo representation of a private key with attributes.
  18438. @param privateKey the key to be encoded into the info object.
  18439. @param attributes the set of attributes to be included.
  18440. @return the appropriate PrivateKeyInfo
  18441. @throws java.io.IOException on an error encoding the key
  18442. </member>
  18443. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.CertStatus.RevocationDate">
  18444. <summary>
  18445. Returns the revocationDate.
  18446. </summary>
  18447. </member>
  18448. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.CertStatus.Status">
  18449. <summary>
  18450. Returns the certStatus.
  18451. </summary>
  18452. </member>
  18453. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixAttrCertChecker.GetSupportedExtensions">
  18454. Returns an immutable <code>Set</code> of X.509 attribute certificate
  18455. extensions that this <code>PkixAttrCertChecker</code> supports or
  18456. <code>null</code> if no extensions are supported.
  18457. <p>
  18458. Each element of the set is a <code>String</code> representing the
  18459. Object Identifier (OID) of the X.509 extension that is supported.
  18460. </p>
  18461. <p>
  18462. All X.509 attribute certificate extensions that a
  18463. <code>PkixAttrCertChecker</code> might possibly be able to process
  18464. should be included in the set.
  18465. </p>
  18466. @return an immutable <code>Set</code> of X.509 extension OIDs (in
  18467. <code>String</code> format) supported by this
  18468. <code>PkixAttrCertChecker</code>, or <code>null</code> if no
  18469. extensions are supported
  18470. </member>
  18471. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixAttrCertChecker.Check(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Collections.Generic.ICollection{System.String})">
  18472. Performs checks on the specified attribute certificate. Every handled
  18473. extension is rmeoved from the <code>unresolvedCritExts</code>
  18474. collection.
  18475. @param attrCert The attribute certificate to be checked.
  18476. @param certPath The certificate path which belongs to the attribute
  18477. certificate issuer public key certificate.
  18478. @param holderCertPath The certificate path which belongs to the holder
  18479. certificate.
  18480. @param unresolvedCritExts a <code>Collection</code> of OID strings
  18481. representing the current set of unresolved critical extensions
  18482. @throws CertPathValidatorException if the specified attribute certificate
  18483. does not pass the check.
  18484. </member>
  18485. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixAttrCertChecker.Clone">
  18486. Returns a clone of this object.
  18487. @return a copy of this <code>PkixAttrCertChecker</code>
  18488. </member>
  18489. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixAttrCertPathBuilder.Build(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixBuilderParameters)">
  18490. Build and validate a CertPath using the given parameter.
  18491. @param params PKIXBuilderParameters object containing all information to
  18492. build the CertPath
  18493. </member>
  18494. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixAttrCertPathValidator">
  18495. CertPathValidatorSpi implementation for X.509 Attribute Certificates la RFC 3281.
  18496. @see org.bouncycastle.x509.ExtendedPkixParameters
  18497. </member>
  18498. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixAttrCertPathValidator.Validate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters)">
  18499. Validates an attribute certificate with the given certificate path.
  18500. <p>
  18501. <code>params</code> must be an instance of
  18502. <code>ExtendedPkixParameters</code>.
  18503. </p><p>
  18504. The target constraints in the <code>params</code> must be an
  18505. <code>X509AttrCertStoreSelector</code> with at least the attribute
  18506. certificate criterion set. Obey that also target informations may be
  18507. necessary to correctly validate this attribute certificate.
  18508. </p><p>
  18509. The attribute certificate issuer must be added to the trusted attribute
  18510. issuers with {@link ExtendedPkixParameters#setTrustedACIssuers(Set)}.
  18511. </p>
  18512. @param certPath The certificate path which belongs to the attribute
  18513. certificate issuer public key certificate.
  18514. @param params The PKIX parameters.
  18515. @return A <code>PKIXCertPathValidatorResult</code> of the result of
  18516. validating the <code>certPath</code>.
  18517. @throws InvalidAlgorithmParameterException if <code>params</code> is
  18518. inappropriate for this validator.
  18519. @throws CertPathValidatorException if the verification fails.
  18520. </member>
  18521. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixBuilderParameters">
  18522. <summary>
  18523. Summary description for PkixBuilderParameters.
  18524. </summary>
  18525. </member>
  18526. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixBuilderParameters.GetInstance(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters)">
  18527. Returns an instance of <code>PkixBuilderParameters</code>.
  18528. <p>
  18529. This method can be used to get a copy from other
  18530. <code>PKIXBuilderParameters</code>, <code>PKIXParameters</code>,
  18531. and <code>ExtendedPKIXParameters</code> instances.
  18532. </p>
  18533. @param pkixParams The PKIX parameters to create a copy of.
  18534. @return An <code>PkixBuilderParameters</code> instance.
  18535. </member>
  18536. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixBuilderParameters.GetExcludedCerts">
  18537. <summary>
  18538. Excluded certificates are not used for building a certification path.
  18539. </summary>
  18540. <returns>the excluded certificates.</returns>
  18541. </member>
  18542. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixBuilderParameters.SetExcludedCerts(System.Collections.Generic.ISet{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate})">
  18543. <summary>
  18544. Sets the excluded certificates which are not used for building a
  18545. certification path. If the <code>ISet</code> is <code>null</code> an
  18546. empty set is assumed.
  18547. </summary>
  18548. <remarks>
  18549. The given set is cloned to protect it against subsequent modifications.
  18550. </remarks>
  18551. <param name="excludedCerts">The excluded certificates to set.</param>
  18552. </member>
  18553. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixBuilderParameters.SetParams(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters)">
  18554. Can alse handle <code>ExtendedPKIXBuilderParameters</code> and
  18555. <code>PKIXBuilderParameters</code>.
  18556. @param params Parameters to set.
  18557. @see org.bouncycastle.x509.ExtendedPKIXParameters#setParams(java.security.cert.PKIXParameters)
  18558. </member>
  18559. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixBuilderParameters.Clone">
  18560. Makes a copy of this <code>PKIXParameters</code> object. Changes to the
  18561. copy will not affect the original and vice versa.
  18562. @return a copy of this <code>PKIXParameters</code> object
  18563. </member>
  18564. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath">
  18565. An immutable sequence of certificates (a certification path).<br />
  18566. <br />
  18567. This is an abstract class that defines the methods common to all CertPaths.
  18568. Subclasses can handle different kinds of certificates (X.509, PGP, etc.).<br />
  18569. <br />
  18570. All CertPath objects have a type, a list of Certificates, and one or more
  18571. supported encodings. Because the CertPath class is immutable, a CertPath
  18572. cannot change in any externally visible way after being constructed. This
  18573. stipulation applies to all public fields and methods of this class and any
  18574. added or overridden by subclasses.<br />
  18575. <br />
  18576. The type is a string that identifies the type of Certificates in the
  18577. certification path. For each certificate cert in a certification path
  18578. certPath, cert.getType().equals(certPath.getType()) must be true.<br />
  18579. <br />
  18580. The list of Certificates is an ordered List of zero or more Certificates.
  18581. This List and all of the Certificates contained in it must be immutable.<br />
  18582. <br />
  18583. Each CertPath object must support one or more encodings so that the object
  18584. can be translated into a byte array for storage or transmission to other
  18585. parties. Preferably, these encodings should be well-documented standards
  18586. (such as PKCS#7). One of the encodings supported by a CertPath is considered
  18587. the default encoding. This encoding is used if no encoding is explicitly
  18588. requested (for the {@link #getEncoded()} method, for instance).<br />
  18589. <br />
  18590. All CertPath objects are also Serializable. CertPath objects are resolved
  18591. into an alternate {@link CertPathRep} object during serialization. This
  18592. allows a CertPath object to be serialized into an equivalent representation
  18593. regardless of its underlying implementation.<br />
  18594. <br />
  18595. CertPath objects can be created with a CertificateFactory or they can be
  18596. returned by other classes, such as a CertPathBuilder.<br />
  18597. <br />
  18598. By convention, X.509 CertPaths (consisting of X509Certificates), are ordered
  18599. starting with the target certificate and ending with a certificate issued by
  18600. the trust anchor. That is, the issuer of one certificate is the subject of
  18601. the following one. The certificate representing the
  18602. {@link TrustAnchor TrustAnchor} should not be included in the certification
  18603. path. Unvalidated X.509 CertPaths may not follow these conventions. PKIX
  18604. CertPathValidators will detect any departure from these conventions that
  18605. cause the certification path to be invalid and throw a
  18606. CertPathValidatorException.<br />
  18607. <br />
  18608. <strong>Concurrent Access</strong><br />
  18609. <br />
  18610. All CertPath objects must be thread-safe. That is, multiple threads may
  18611. concurrently invoke the methods defined in this class on a single CertPath
  18612. object (or more than one) with no ill effects. This is also true for the List
  18613. returned by CertPath.getCertificates.<br />
  18614. <br />
  18615. Requiring CertPath objects to be immutable and thread-safe allows them to be
  18616. passed around to various pieces of code without worrying about coordinating
  18617. access. Providing this thread-safety is generally not difficult, since the
  18618. CertPath and List objects in question are immutable.
  18619. @see CertificateFactory
  18620. @see CertPathBuilder
  18621. <summary>
  18622. CertPath implementation for X.509 certificates.
  18623. </summary>
  18624. </member>
  18625. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate})">
  18626. Creates a CertPath of the specified type.
  18627. This constructor is protected because most users should use
  18628. a CertificateFactory to create CertPaths.
  18629. @param type the standard name of the type of Certificatesin this path
  18630. </member>
  18631. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath.#ctor(System.IO.Stream,System.String)">
  18632. Creates a CertPath of the specified type.
  18633. This constructor is protected because most users should use
  18634. a CertificateFactory to create CertPaths.
  18635. @param type the standard name of the type of Certificatesin this path
  18636. </member>
  18637. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath.Encodings">
  18638. Returns an iteration of the encodings supported by this
  18639. certification path, with the default encoding
  18640. first. Attempts to modify the returned Iterator via its
  18641. remove method result in an UnsupportedOperationException.
  18642. @return an Iterator over the names of the supported encodings (as Strings)
  18643. </member>
  18644. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath.Equals(System.Object)">
  18645. Compares this certification path for equality with the specified object.
  18646. Two CertPaths are equal if and only if their types are equal and their
  18647. certificate Lists (and by implication the Certificates in those Lists)
  18648. are equal. A CertPath is never equal to an object that is not a CertPath.<br />
  18649. <br />
  18650. This algorithm is implemented by this method. If it is overridden, the
  18651. behavior specified here must be maintained.
  18652. @param other
  18653. the object to test for equality with this certification path
  18654. @return true if the specified object is equal to this certification path,
  18655. false otherwise
  18656. @see Object#hashCode() Object.hashCode()
  18657. </member>
  18658. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath.GetEncoded">
  18659. Returns the encoded form of this certification path, using
  18660. the default encoding.
  18661. @return the encoded bytes
  18662. @exception CertificateEncodingException if an encoding error occurs
  18663. </member>
  18664. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath.GetEncoded(System.String)">
  18665. Returns the encoded form of this certification path, using
  18666. the specified encoding.
  18667. @param encoding the name of the encoding to use
  18668. @return the encoded bytes
  18669. @exception CertificateEncodingException if an encoding error
  18670. occurs or the encoding requested is not supported
  18671. </member>
  18672. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath.Certificates">
  18673. <summary>
  18674. Returns the list of certificates in this certification
  18675. path.
  18676. </summary>
  18677. </member>
  18678. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath.ToAsn1Object(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  18679. Return a DERObject containing the encoded certificate.
  18680. @param cert the X509Certificate object to be encoded
  18681. @return the DERObject
  18682. </member>
  18683. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathBuilder">
  18684. Implements the PKIX CertPathBuilding algorithm for BouncyCastle.
  18685. @see CertPathBuilderSpi
  18686. </member>
  18687. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathBuilder.Build(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixBuilderParameters)">
  18688. Build and validate a CertPath using the given parameter.
  18689. @param params PKIXBuilderParameters object containing all information to
  18690. build the CertPath
  18691. </member>
  18692. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathBuilderResult">
  18693. <summary>
  18694. Summary description for PkixCertPathBuilderResult.
  18695. </summary>
  18696. </member>
  18697. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathChecker.Init(System.Boolean)">
  18698. * Initializes the internal state of this <code>PKIXCertPathChecker</code>.
  18699. * <p>
  18700. * The <code>forward</code> flag specifies the order that certificates
  18701. * will be passed to the {@link #check check} method (forward or reverse). A
  18702. * <code>PKIXCertPathChecker</code> <b>must</b> support reverse checking
  18703. * and <b>may</b> support forward checking.
  18704. * </p>
  18705. *
  18706. * @param forward
  18707. * the order that certificates are presented to the
  18708. * <code>check</code> method. If <code>true</code>,
  18709. * certificates are presented from target to most-trusted CA
  18710. * (forward); if <code>false</code>, from most-trusted CA to
  18711. * target (reverse).
  18712. * @exception CertPathValidatorException
  18713. * if this <code>PKIXCertPathChecker</code> is unable to
  18714. * check certificates in the specified order; it should never
  18715. * be thrown if the forward flag is false since reverse
  18716. * checking must be supported
  18717. </member>
  18718. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathChecker.IsForwardCheckingSupported">
  18719. Indicates if forward checking is supported. Forward checking refers to
  18720. the ability of the <code>PKIXCertPathChecker</code> to perform its
  18721. checks when certificates are presented to the <code>check</code> method
  18722. in the forward direction (from target to most-trusted CA).
  18723. @return <code>true</code> if forward checking is supported,
  18724. <code>false</code> otherwise
  18725. </member>
  18726. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathChecker.GetSupportedExtensions">
  18727. * Returns an immutable <code>Set</code> of X.509 certificate extensions
  18728. * that this <code>PKIXCertPathChecker</code> supports (i.e. recognizes,
  18729. * is able to process), or <code>null</code> if no extensions are
  18730. * supported.
  18731. * <p>
  18732. * Each element of the set is a <code>String</code> representing the
  18733. * Object Identifier (OID) of the X.509 extension that is supported. The OID
  18734. * is represented by a set of nonnegative integers separated by periods.
  18735. * </p><p>
  18736. * All X.509 certificate extensions that a <code>PKIXCertPathChecker</code>
  18737. * might possibly be able to process should be included in the set.
  18738. * </p>
  18739. *
  18740. * @return an immutable <code>Set</code> of X.509 extension OIDs (in
  18741. * <code>String</code> format) supported by this
  18742. * <code>PKIXCertPathChecker</code>, or <code>null</code> if no
  18743. * extensions are supported
  18744. </member>
  18745. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathChecker.Check(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.Collections.Generic.ISet{System.String})">
  18746. Performs the check(s) on the specified certificate using its internal
  18747. state and removes any critical extensions that it processes from the
  18748. specified collection of OID strings that represent the unresolved
  18749. critical extensions. The certificates are presented in the order
  18750. specified by the <code>init</code> method.
  18751. @param cert
  18752. the <code>Certificate</code> to be checked
  18753. @param unresolvedCritExts
  18754. a <code>Collection</code> of OID strings representing the
  18755. current set of unresolved critical extensions
  18756. @exception CertPathValidatorException
  18757. if the specified certificate does not pass the check
  18758. </member>
  18759. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathChecker.Clone">
  18760. Returns a clone of this object. Calls the <code>Object.clone()</code>
  18761. method. All subclasses which maintain state must support and override
  18762. this method, if necessary.
  18763. @return a copy of this <code>PKIXCertPathChecker</code>
  18764. </member>
  18765. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidator">
  18766. The <i>Service Provider Interface</i> (<b>SPI</b>)
  18767. for the {@link CertPathValidator CertPathValidator} class. All
  18768. <code>CertPathValidator</code> implementations must include a class (the
  18769. SPI class) that extends this class (<code>CertPathValidatorSpi</code>)
  18770. and implements all of its methods. In general, instances of this class
  18771. should only be accessed through the <code>CertPathValidator</code> class.
  18772. For details, see the Java Cryptography Architecture.<br />
  18773. <br />
  18774. <b>Concurrent Access</b><br />
  18775. <br />
  18776. Instances of this class need not be protected against concurrent
  18777. access from multiple threads. Threads that need to access a single
  18778. <code>CertPathValidatorSpi</code> instance concurrently should synchronize
  18779. amongst themselves and provide the necessary locking before calling the
  18780. wrapping <code>CertPathValidator</code> object.<br />
  18781. <br />
  18782. However, implementations of <code>CertPathValidatorSpi</code> may still
  18783. encounter concurrency issues, since multiple threads each
  18784. manipulating a different <code>CertPathValidatorSpi</code> instance need not
  18785. synchronize.
  18786. <summary>
  18787. CertPathValidatorSpi implementation for X.509 Certificate validation a la RFC
  18788. 3280.
  18789. </summary>
  18790. </member>
  18791. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException">
  18792. An exception indicating one of a variety of problems encountered when
  18793. validating a certification path. <br />
  18794. <br />
  18795. A <code>CertPathValidatorException</code> provides support for wrapping
  18796. exceptions. The {@link #getCause getCause} method returns the throwable,
  18797. if any, that caused this exception to be thrown. <br />
  18798. <br />
  18799. A <code>CertPathValidatorException</code> may also include the
  18800. certification path that was being validated when the exception was thrown
  18801. and the index of the certificate in the certification path that caused the
  18802. exception to be thrown. Use the {@link #getCertPath getCertPath} and
  18803. {@link #getIndex getIndex} methods to retrieve this information.<br />
  18804. <br />
  18805. <b>Concurrent Access</b><br />
  18806. <br />
  18807. Unless otherwise specified, the methods defined in this class are not
  18808. thread-safe. Multiple threads that need to access a single
  18809. object concurrently should synchronize amongst themselves and
  18810. provide the necessary locking. Multiple threads each manipulating
  18811. separate objects need not synchronize.
  18812. @see CertPathValidator
  18813. </member>
  18814. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException.#ctor(System.String,System.Exception,System.Int32)">
  18815. <summary>
  18816. Creates a <code>PkixCertPathValidatorException</code> with the specified
  18817. detail message, cause, certification path, and index.
  18818. </summary>
  18819. <param name="message">the detail message (or <code>null</code> if none)</param>
  18820. <param name="innerException">the cause (or <code>null</code> if none)</param>
  18821. <param name="index">the index of the certificate in the certification path that</param> *
  18822. </member>
  18823. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException.Index">
  18824. <summary> eturns the index of the certificate in the certification path that caused the exception to be
  18825. thrown.</summary>
  18826. <remarks>
  18827. Note that the list of certificates in a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath"/> is zero based. If no index has been set,
  18828. -1 is returned.
  18829. </remarks>
  18830. <returns>The index that has been set, or -1 if none has been set.</returns>
  18831. </member>
  18832. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorResult">
  18833. <summary>
  18834. Summary description for PkixCertPathValidatorResult.
  18835. </summary>
  18836. </member>
  18837. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities">
  18838. <summary>
  18839. Summary description for PkixCertPathValidatorUtilities.
  18840. </summary>
  18841. </member>
  18842. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.KEY_CERT_SIGN">
  18843. <summary>
  18844. key usage bits
  18845. </summary>
  18846. </member>
  18847. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.FindTrustAnchor(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.Collections.Generic.ISet{Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor})">
  18848. <summary>
  18849. Search the given Set of TrustAnchor's for one that is the
  18850. issuer of the given X509 certificate.
  18851. </summary>
  18852. <param name="cert">the X509 certificate</param>
  18853. <param name="trustAnchors">a Set of TrustAnchor's</param>
  18854. <returns>the <code>TrustAnchor</code> object if found or
  18855. <code>null</code> if not.
  18856. </returns>
  18857. @exception
  18858. </member>
  18859. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.GetIssuerPrincipal(System.Object)">
  18860. <summary>
  18861. Returns the issuer of an attribute certificate or certificate.
  18862. </summary>
  18863. <param name="obj">The attribute certificate or certificate.</param>
  18864. <returns>The issuer as <code>X500Principal</code>.</returns>
  18865. </member>
  18866. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.GetNextWorkingKey(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate},System.Int32)">
  18867. Return the next working key inheriting DSA parameters if necessary.
  18868. <p>
  18869. This methods inherits DSA parameters from the indexed certificate or
  18870. previous certificates in the certificate chain to the returned
  18871. <code>PublicKey</code>. The list is searched upwards, meaning the end
  18872. certificate is at position 0 and previous certificates are following.
  18873. </p>
  18874. <p>
  18875. If the indexed certificate does not contain a DSA key this method simply
  18876. returns the public key. If the DSA key already contains DSA parameters
  18877. the key is also only returned.
  18878. </p>
  18879. @param certs The certification path.
  18880. @param index The index of the certificate which contains the public key
  18881. which should be extended with DSA parameters.
  18882. @return The public key of the certificate in list position
  18883. <code>index</code> extended with DSA parameters if applicable.
  18884. @throws Exception if DSA parameters cannot be inherited.
  18885. </member>
  18886. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.GetCrlIssuersFromDistributionPoint(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DistributionPoint,System.Collections.Generic.ICollection{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name},Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CrlStoreSelector,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters)">
  18887. Add the CRL issuers from the cRLIssuer field of the distribution point or
  18888. from the certificate if not given to the issuer criterion of the
  18889. <code>selector</code>.
  18890. <p>
  18891. The <code>issuerPrincipals</code> are a collection with a single
  18892. <code>X500Principal</code> for <code>X509Certificate</code>s. For
  18893. {@link X509AttributeCertificate}s the issuer may contain more than one
  18894. <code>X500Principal</code>.
  18895. </p>
  18896. @param dp The distribution point.
  18897. @param issuerPrincipals The issuers of the certificate or attribute
  18898. certificate which contains the distribution point.
  18899. @param selector The CRL selector.
  18900. @param pkixParams The PKIX parameters containing the cert stores.
  18901. @throws Exception if an exception occurs while processing.
  18902. @throws ClassCastException if <code>issuerPrincipals</code> does not
  18903. contain only <code>X500Principal</code>s.
  18904. </member>
  18905. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.GetCompleteCrls(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DistributionPoint,System.Object,System.DateTime,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters)">
  18906. Fetches complete CRLs according to RFC 3280.
  18907. @param dp The distribution point for which the complete CRL
  18908. @param cert The <code>X509Certificate</code> or
  18909. {@link org.bouncycastle.x509.X509AttributeCertificate} for
  18910. which the CRL should be searched.
  18911. @param currentDate The date for which the delta CRLs must be valid.
  18912. @param paramsPKIX The extended PKIX parameters.
  18913. @return A <code>Set</code> of <code>X509CRL</code>s with complete
  18914. CRLs.
  18915. @throws Exception if an exception occurs while picking the CRLs
  18916. or no CRLs are found.
  18917. </member>
  18918. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.GetDeltaCrls(System.DateTime,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl)">
  18919. Fetches delta CRLs according to RFC 3280 section 5.2.4.
  18920. @param currentDate The date for which the delta CRLs must be valid.
  18921. @param paramsPKIX The extended PKIX parameters.
  18922. @param completeCRL The complete CRL the delta CRL is for.
  18923. @return A <code>Set</code> of <code>X509CRL</code>s with delta CRLs.
  18924. @throws Exception if an exception occurs while picking the delta
  18925. CRLs.
  18926. </member>
  18927. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.FindIssuerCerts(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixBuilderParameters)">
  18928. Find the issuer certificates of a given certificate.
  18929. @param cert
  18930. The certificate for which an issuer should be found.
  18931. @param pkixParams
  18932. @return A <code>Collection</code> object containing the issuer
  18933. <code>X509Certificate</code>s. Never <code>null</code>.
  18934. @exception Exception
  18935. if an error occurs.
  18936. </member>
  18937. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCrlUtilities.FindCrls(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.ISelector{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.IStore{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl}})">
  18938. <summary>
  18939. crl checking
  18940. Return a Collection of all CRLs found in the X509Store's that are
  18941. matching the crlSelect criteriums.
  18942. </summary>
  18943. <param name="crlSelector">a {@link X509CRLStoreSelector} object that will be used
  18944. to select the CRLs</param>
  18945. <param name="crlStores">a List containing only {@link org.bouncycastle.x509.X509Store
  18946. X509Store} objects. These are used to search for CRLs</param>
  18947. <returns>a Collection of all found {@link X509CRL X509CRL} objects. May be
  18948. empty but never <code>null</code>.
  18949. </returns>
  18950. </member>
  18951. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IntersectIP(System.Collections.Generic.ISet{System.Byte[]},System.Collections.Generic.ISet{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralSubtree})">
  18952. Returns the intersection of the permitted IP ranges in
  18953. <code>permitted</code> with <code>ip</code>.
  18954. @param permitted A <code>Set</code> of permitted IP addresses with
  18955. their subnet mask as byte arrays.
  18956. @param ips The IP address with its subnet mask.
  18957. @return The <code>Set</code> of permitted IP ranges intersected with
  18958. <code>ip</code>.
  18959. </member>
  18960. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.UnionIP(System.Collections.Generic.ISet{System.Byte[]},System.Byte[])">
  18961. Returns the union of the excluded IP ranges in <code>excluded</code>
  18962. with <code>ip</code>.
  18963. @param excluded A <code>Set</code> of excluded IP addresses with their
  18964. subnet mask as byte arrays.
  18965. @param ip The IP address with its subnet mask.
  18966. @return The <code>Set</code> of excluded IP ranges unified with
  18967. <code>ip</code> as byte arrays.
  18968. </member>
  18969. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.UnionIPRange(System.Byte[],System.Byte[])">
  18970. Calculates the union if two IP ranges.
  18971. @param ipWithSubmask1 The first IP address with its subnet mask.
  18972. @param ipWithSubmask2 The second IP address with its subnet mask.
  18973. @return A <code>Set</code> with the union of both addresses.
  18974. </member>
  18975. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IntersectIPRange(System.Byte[],System.Byte[])">
  18976. Calculates the interesction if two IP ranges.
  18977. @param ipWithSubmask1 The first IP address with its subnet mask.
  18978. @param ipWithSubmask2 The second IP address with its subnet mask.
  18979. @return A <code>Set</code> with the single IP address with its subnet
  18980. mask as a byte array or an empty <code>Set</code>.
  18981. </member>
  18982. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IpWithSubnetMask(System.Byte[],System.Byte[])">
  18983. Concatenates the IP address with its subnet mask.
  18984. @param ip The IP address.
  18985. @param subnetMask Its subnet mask.
  18986. @return The concatenated IP address with its subnet mask.
  18987. </member>
  18988. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.ExtractIPsAndSubnetMasks(System.Byte[],System.Byte[])">
  18989. Splits the IP addresses and their subnet mask.
  18990. @param ipWithSubmask1 The first IP address with the subnet mask.
  18991. @param ipWithSubmask2 The second IP address with the subnet mask.
  18992. @return An array with two elements. Each element contains the IP address
  18993. and the subnet mask in this order.
  18994. </member>
  18995. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.MinMaxIPs(System.Byte[],System.Byte[],System.Byte[],System.Byte[])">
  18996. Based on the two IP addresses and their subnet masks the IP range is
  18997. computed for each IP address - subnet mask pair and returned as the
  18998. minimum IP address and the maximum address of the range.
  18999. @param ip1 The first IP address.
  19000. @param subnetmask1 The subnet mask of the first IP address.
  19001. @param ip2 The second IP address.
  19002. @param subnetmask2 The subnet mask of the second IP address.
  19003. @return A array with two elements. The first/second element contains the
  19004. min and max IP address of the first/second IP address and its
  19005. subnet mask.
  19006. </member>
  19007. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IsIPConstrained(System.Byte[],System.Byte[])">
  19008. Checks if the IP address <code>ip</code> is constrained by
  19009. <code>constraint</code>.
  19010. @param constraint The constraint. This is an IP address concatenated with
  19011. its subnetmask.
  19012. @param ip The IP address.
  19013. @return <code>true</code> if constrained, <code>false</code>
  19014. otherwise.
  19015. </member>
  19016. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.CheckPermittedIP(System.Collections.Generic.ISet{System.Byte[]},System.Byte[])">
  19017. Checks if the IP <code>ip</code> is included in the permitted ISet
  19018. <code>permitted</code>.
  19019. @param permitted A <code>Set</code> of permitted IP addresses with
  19020. their subnet mask as byte arrays.
  19021. @param ip The IP address.
  19022. @throws PkixNameConstraintValidatorException
  19023. if the IP is not permitted.
  19024. </member>
  19025. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.CheckExcludedIP(System.Collections.Generic.ISet{System.Byte[]},System.Byte[])">
  19026. Checks if the IP <code>ip</code> is included in the excluded ISet
  19027. <code>excluded</code>.
  19028. @param excluded A <code>Set</code> of excluded IP addresses with their
  19029. subnet mask as byte arrays.
  19030. @param ip The IP address.
  19031. @throws PkixNameConstraintValidatorException
  19032. if the IP is excluded.
  19033. </member>
  19034. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.UnionEmail(System.String,System.String,System.Collections.Generic.ISet{System.String})">
  19035. The common part of <code>email1</code> and <code>email2</code> is
  19036. added to the union <code>union</code>. If <code>email1</code> and
  19037. <code>email2</code> have nothing in common they are added both.
  19038. @param email1 Email address constraint 1.
  19039. @param email2 Email address constraint 2.
  19040. @param union The union.
  19041. </member>
  19042. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IntersectEmail(System.String,System.String,System.Collections.Generic.ISet{System.String})">
  19043. The most restricting part from <code>email1</code> and
  19044. <code>email2</code> is added to the intersection <code>intersect</code>.
  19045. @param email1 Email address constraint 1.
  19046. @param email2 Email address constraint 2.
  19047. @param intersect The intersection.
  19048. </member>
  19049. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.checkPermitted(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  19050. Checks if the given GeneralName is in the permitted ISet.
  19051. @param name The GeneralName
  19052. @throws PkixNameConstraintValidatorException
  19053. If the <code>name</code>
  19054. </member>
  19055. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.checkExcluded(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  19056. Check if the given GeneralName is contained in the excluded ISet.
  19057. @param name The GeneralName.
  19058. @throws PkixNameConstraintValidatorException
  19059. If the <code>name</code> is
  19060. excluded.
  19061. </member>
  19062. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IntersectPermittedSubtree(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence)">
  19063. Updates the permitted ISet of these name constraints with the intersection
  19064. with the given subtree.
  19065. @param permitted The permitted subtrees
  19066. </member>
  19067. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.AddExcludedSubtree(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralSubtree)">
  19068. Adds a subtree to the excluded ISet of these name constraints.
  19069. @param subtree A subtree with an excluded GeneralName.
  19070. </member>
  19071. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.Max(System.Byte[],System.Byte[])">
  19072. Returns the maximum IP address.
  19073. @param ip1 The first IP address.
  19074. @param ip2 The second IP address.
  19075. @return The maximum IP address.
  19076. </member>
  19077. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.Min(System.Byte[],System.Byte[])">
  19078. Returns the minimum IP address.
  19079. @param ip1 The first IP address.
  19080. @param ip2 The second IP address.
  19081. @return The minimum IP address.
  19082. </member>
  19083. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.CompareTo(System.Byte[],System.Byte[])">
  19084. Compares IP address <code>ip1</code> with <code>ip2</code>. If ip1
  19085. is equal to ip2 0 is returned. If ip1 is bigger 1 is returned, -1
  19086. otherwise.
  19087. @param ip1 The first IP address.
  19088. @param ip2 The second IP address.
  19089. @return 0 if ip1 is equal to ip2, 1 if ip1 is bigger, -1 otherwise.
  19090. </member>
  19091. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.Or(System.Byte[],System.Byte[])">
  19092. Returns the logical OR of the IP addresses <code>ip1</code> and
  19093. <code>ip2</code>.
  19094. @param ip1 The first IP address.
  19095. @param ip2 The second IP address.
  19096. @return The OR of <code>ip1</code> and <code>ip2</code>.
  19097. </member>
  19098. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator.StringifyIP(System.Byte[])">
  19099. Stringifies an IPv4 or v6 address with subnet mask.
  19100. @param ip The IP with subnet mask.
  19101. @return The stringified IP address.
  19102. </member>
  19103. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters">
  19104. <summary>
  19105. Summary description for PkixParameters.
  19106. </summary>
  19107. </member>
  19108. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.PkixValidityModel">
  19109. This is the default PKIX validity model. Actually there are two variants
  19110. of this: The PKIX model and the modified PKIX model. The PKIX model
  19111. verifies that all involved certificates must have been valid at the
  19112. current time. The modified PKIX model verifies that all involved
  19113. certificates were valid at the signing time. Both are indirectly choosen
  19114. with the {@link PKIXParameters#setDate(java.util.Date)} method, so this
  19115. methods sets the Date when <em>all</em> certificates must have been
  19116. valid.
  19117. </member>
  19118. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.ChainValidityModel">
  19119. This model uses the following validity model. Each certificate must have
  19120. been valid at the moment where is was used. That means the end
  19121. certificate must have been valid at the time the signature was done. The
  19122. CA certificate which signed the end certificate must have been valid,
  19123. when the end certificate was signed. The CA (or Root CA) certificate must
  19124. have been valid, when the CA certificate was signed and so on. So the
  19125. {@link PKIXParameters#setDate(java.util.Date)} method sets the time, when
  19126. the <em>end certificate</em> must have been valid. <p/> It is used e.g.
  19127. in the German signature law.
  19128. </member>
  19129. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.#ctor(System.Collections.Generic.ISet{Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor})">
  19130. Creates an instance of PKIXParameters with the specified Set of
  19131. most-trusted CAs. Each element of the set is a TrustAnchor.<br />
  19132. <br />
  19133. Note that the Set is copied to protect against subsequent modifications.
  19134. @param trustAnchors
  19135. a Set of TrustAnchors
  19136. @exception InvalidAlgorithmParameterException
  19137. if the specified Set is empty
  19138. <code>(trustAnchors.isEmpty() == true)</code>
  19139. @exception NullPointerException
  19140. if the specified Set is <code>null</code>
  19141. @exception ClassCastException
  19142. if any of the elements in the Set are not of type
  19143. <code>java.security.cert.TrustAnchor</code>
  19144. </member>
  19145. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.GetTargetConstraintsAttrCert">
  19146. Returns the required constraints on the target certificate or attribute
  19147. certificate. The constraints are returned as an instance of
  19148. <code>IX509Selector</code>. If <code>null</code>, no constraints are
  19149. defined.
  19150. <p>
  19151. The target certificate in a PKIX path may be a certificate or an
  19152. attribute certificate.
  19153. </p><p>
  19154. Note that the <code>IX509Selector</code> returned is cloned to protect
  19155. against subsequent modifications.
  19156. </p>
  19157. @return a <code>IX509Selector</code> specifying the constraints on the
  19158. target certificate or attribute certificate (or <code>null</code>)
  19159. @see #setTargetConstraints
  19160. @see X509CertStoreSelector
  19161. @see X509AttributeCertStoreSelector
  19162. </member>
  19163. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.SetTargetConstraintsAttrCert(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.ISelector{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificate})">
  19164. Sets the required constraints on the target certificate or attribute
  19165. certificate. The constraints are specified as an instance of
  19166. <code>IX509Selector</code>. If <code>null</code>, no constraints are
  19167. defined.
  19168. <p>
  19169. The target certificate in a PKIX path may be a certificate or an
  19170. attribute certificate.
  19171. </p><p>
  19172. Note that the <code>IX509Selector</code> specified is cloned to protect
  19173. against subsequent modifications.
  19174. </p>
  19175. @param selector a <code>IX509Selector</code> specifying the constraints on
  19176. the target certificate or attribute certificate (or
  19177. <code>null</code>)
  19178. @see #getTargetConstraints
  19179. @see X509CertStoreSelector
  19180. @see X509AttributeCertStoreSelector
  19181. </member>
  19182. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.GetTargetConstraintsCert">
  19183. Returns the required constraints on the target certificate. The
  19184. constraints are returned as an instance of CertSelector. If
  19185. <code>null</code>, no constraints are defined.<br />
  19186. <br />
  19187. Note that the CertSelector returned is cloned to protect against
  19188. subsequent modifications.
  19189. @return a CertSelector specifying the constraints on the target
  19190. certificate (or <code>null</code>)
  19191. @see #setTargetCertConstraints(CertSelector)
  19192. </member>
  19193. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.SetTargetConstraintsCert(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.ISelector{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate})">
  19194. Sets the required constraints on the target certificate. The constraints
  19195. are specified as an instance of CertSelector. If null, no constraints are
  19196. defined.<br />
  19197. <br />
  19198. Note that the CertSelector specified is cloned to protect against
  19199. subsequent modifications.
  19200. @param selector
  19201. a CertSelector specifying the constraints on the target
  19202. certificate (or <code>null</code>)
  19203. @see #getTargetCertConstraints()
  19204. </member>
  19205. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.GetInitialPolicies">
  19206. Returns an immutable Set of initial policy identifiers (OID strings),
  19207. indicating that any one of these policies would be acceptable to the
  19208. certificate user for the purposes of certification path processing. The
  19209. default return value is an empty <code>Set</code>, which is
  19210. interpreted as meaning that any policy would be acceptable.
  19211. @return an immutable <code>Set</code> of initial policy OIDs in String
  19212. format, or an empty <code>Set</code> (implying any policy is
  19213. acceptable). Never returns <code>null</code>.
  19214. @see #setInitialPolicies(java.util.Set)
  19215. </member>
  19216. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.SetInitialPolicies(System.Collections.Generic.ISet{System.String})">
  19217. Sets the <code>Set</code> of initial policy identifiers (OID strings),
  19218. indicating that any one of these policies would be acceptable to the
  19219. certificate user for the purposes of certification path processing. By
  19220. default, any policy is acceptable (i.e. all policies), so a user that
  19221. wants to allow any policy as acceptable does not need to call this
  19222. method, or can call it with an empty <code>Set</code> (or
  19223. <code>null</code>).<br />
  19224. <br />
  19225. Note that the Set is copied to protect against subsequent modifications.<br />
  19226. <br />
  19227. @param initialPolicies
  19228. a Set of initial policy OIDs in String format (or
  19229. <code>null</code>)
  19230. @exception ClassCastException
  19231. if any of the elements in the set are not of type String
  19232. @see #getInitialPolicies()
  19233. </member>
  19234. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.SetCertPathCheckers(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathChecker})">
  19235. Sets a <code>List</code> of additional certification path checkers. If
  19236. the specified List contains an object that is not a PKIXCertPathChecker,
  19237. it is ignored.<br />
  19238. <br />
  19239. Each <code>PKIXCertPathChecker</code> specified implements additional
  19240. checks on a certificate. Typically, these are checks to process and
  19241. verify private extensions contained in certificates. Each
  19242. <code>PKIXCertPathChecker</code> should be instantiated with any
  19243. initialization parameters needed to execute the check.<br />
  19244. <br />
  19245. This method allows sophisticated applications to extend a PKIX
  19246. <code>CertPathValidator</code> or <code>CertPathBuilder</code>. Each
  19247. of the specified PKIXCertPathCheckers will be called, in turn, by a PKIX
  19248. <code>CertPathValidator</code> or <code>CertPathBuilder</code> for
  19249. each certificate processed or validated.<br />
  19250. <br />
  19251. Regardless of whether these additional PKIXCertPathCheckers are set, a
  19252. PKIX <code>CertPathValidator</code> or <code>CertPathBuilder</code>
  19253. must perform all of the required PKIX checks on each certificate. The one
  19254. exception to this rule is if the RevocationEnabled flag is set to false
  19255. (see the {@link #setRevocationEnabled(boolean) setRevocationEnabled}
  19256. method).<br />
  19257. <br />
  19258. Note that the List supplied here is copied and each PKIXCertPathChecker
  19259. in the list is cloned to protect against subsequent modifications.
  19260. @param checkers
  19261. a List of PKIXCertPathCheckers. May be null, in which case no
  19262. additional checkers will be used.
  19263. @exception ClassCastException
  19264. if any of the elements in the list are not of type
  19265. <code>java.security.cert.PKIXCertPathChecker</code>
  19266. @see #getCertPathCheckers()
  19267. </member>
  19268. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.GetCertPathCheckers">
  19269. Returns the List of certification path checkers. Each PKIXCertPathChecker
  19270. in the returned IList is cloned to protect against subsequent modifications.
  19271. @return an immutable List of PKIXCertPathCheckers (may be empty, but not
  19272. <code>null</code>)
  19273. @see #setCertPathCheckers(java.util.List)
  19274. </member>
  19275. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.AddCertPathChecker(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathChecker)">
  19276. Adds a <code>PKIXCertPathChecker</code> to the list of certification
  19277. path checkers. See the {@link #setCertPathCheckers setCertPathCheckers}
  19278. method for more details.
  19279. <p>
  19280. Note that the <code>PKIXCertPathChecker</code> is cloned to protect
  19281. against subsequent modifications.</p>
  19282. @param checker a <code>PKIXCertPathChecker</code> to add to the list of
  19283. checks. If <code>null</code>, the checker is ignored (not added to list).
  19284. </member>
  19285. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.SetParams(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters)">
  19286. Method to support <code>Clone()</code> under J2ME.
  19287. <code>super.Clone()</code> does not exist and fields are not copied.
  19288. @param params Parameters to set. If this are
  19289. <code>ExtendedPkixParameters</code> they are copied to.
  19290. </member>
  19291. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.IsUseDeltasEnabled">
  19292. Whether delta CRLs should be used for checking the revocation status.
  19293. Defaults to <code>false</code>.
  19294. </member>
  19295. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.ValidityModel">
  19296. The validity model.
  19297. @see #CHAIN_VALIDITY_MODEL
  19298. @see #PKIX_VALIDITY_MODEL
  19299. </member>
  19300. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.IsAdditionalLocationsEnabled">
  19301. Returns if additional {@link X509Store}s for locations like LDAP found
  19302. in certificates or CRLs should be used.
  19303. @return Returns <code>true</code> if additional stores are used.
  19304. </member>
  19305. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.SetAdditionalLocationsEnabled(System.Boolean)">
  19306. Sets if additional {@link X509Store}s for locations like LDAP found in
  19307. certificates or CRLs should be used.
  19308. @param enabled <code>true</code> if additional stores are used.
  19309. </member>
  19310. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.GetTrustedACIssuers">
  19311. Returns the trusted attribute certificate issuers. If attribute
  19312. certificates is verified the trusted AC issuers must be set.
  19313. <p>
  19314. The returned <code>ISet</code> consists of <code>TrustAnchor</code>s.
  19315. </p><p>
  19316. The returned <code>ISet</code> is immutable. Never <code>null</code>
  19317. </p>
  19318. @return Returns an immutable set of the trusted AC issuers.
  19319. </member>
  19320. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.SetTrustedACIssuers(System.Collections.Generic.ISet{Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor})">
  19321. Sets the trusted attribute certificate issuers. If attribute certificates
  19322. is verified the trusted AC issuers must be set.
  19323. <p>
  19324. The <code>trustedACIssuers</code> must be a <code>ISet</code> of
  19325. <code>TrustAnchor</code>
  19326. </p><p>
  19327. The given set is cloned.
  19328. </p>
  19329. @param trustedACIssuers The trusted AC issuers to set. Is never
  19330. <code>null</code>.
  19331. @throws ClassCastException if an element of <code>stores</code> is not
  19332. a <code>TrustAnchor</code>.
  19333. </member>
  19334. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.GetNecessaryACAttributes">
  19335. Returns the necessary attributes which must be contained in an attribute
  19336. certificate.
  19337. <p>
  19338. The returned <code>ISet</code> is immutable and contains
  19339. <code>String</code>s with the OIDs.
  19340. </p>
  19341. @return Returns the necessary AC attributes.
  19342. </member>
  19343. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.SetNecessaryACAttributes(System.Collections.Generic.ISet{System.String})">
  19344. Sets the necessary which must be contained in an attribute certificate.
  19345. <p>
  19346. The <code>ISet</code> must contain <code>String</code>s with the
  19347. OIDs.
  19348. </p><p>
  19349. The set is cloned.
  19350. </p>
  19351. @param necessaryACAttributes The necessary AC attributes to set.
  19352. @throws ClassCastException if an element of
  19353. <code>necessaryACAttributes</code> is not a
  19354. <code>String</code>.
  19355. </member>
  19356. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.GetProhibitedACAttributes">
  19357. Returns the attribute certificates which are not allowed.
  19358. <p>
  19359. The returned <code>ISet</code> is immutable and contains
  19360. <code>String</code>s with the OIDs.
  19361. </p>
  19362. @return Returns the prohibited AC attributes. Is never <code>null</code>.
  19363. </member>
  19364. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.SetProhibitedACAttributes(System.Collections.Generic.ISet{System.String})">
  19365. Sets the attribute certificates which are not allowed.
  19366. <p>
  19367. The <code>ISet</code> must contain <code>String</code>s with the
  19368. OIDs.
  19369. </p><p>
  19370. The set is cloned.
  19371. </p>
  19372. @param prohibitedACAttributes The prohibited AC attributes to set.
  19373. @throws ClassCastException if an element of
  19374. <code>prohibitedACAttributes</code> is not a
  19375. <code>String</code>.
  19376. </member>
  19377. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.GetAttrCertCheckers">
  19378. Returns the attribute certificate checker. The returned set contains
  19379. {@link PKIXAttrCertChecker}s and is immutable.
  19380. @return Returns the attribute certificate checker. Is never
  19381. <code>null</code>.
  19382. </member>
  19383. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters.SetAttrCertCheckers(System.Collections.Generic.ISet{Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixAttrCertChecker})">
  19384. Sets the attribute certificate checkers.
  19385. <p>
  19386. All elements in the <code>ISet</code> must a {@link PKIXAttrCertChecker}.
  19387. </p>
  19388. <p>
  19389. The given set is cloned.
  19390. </p>
  19391. @param attrCertCheckers The attribute certificate checkers to set. Is
  19392. never <code>null</code>.
  19393. @throws ClassCastException if an element of <code>attrCertCheckers</code>
  19394. is not a <code>PKIXAttrCertChecker</code>.
  19395. </member>
  19396. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixPolicyNode">
  19397. <summary>
  19398. Summary description for PkixPolicyNode.
  19399. </summary>
  19400. </member>
  19401. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixPolicyNode.#ctor(System.Collections.Generic.IEnumerable{Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixPolicyNode},System.Int32,System.Collections.Generic.ISet{System.String},Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixPolicyNode,System.Collections.Generic.ISet{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.PolicyQualifierInfo},System.String,System.Boolean)">
  19402. Constructors
  19403. </member>
  19404. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask">
  19405. <summary>
  19406. This class helps to handle CRL revocation reasons mask. Each CRL handles a
  19407. certain set of revocation reasons.
  19408. </summary>
  19409. </member>
  19410. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask.#ctor(System.Int32)">
  19411. <summary>
  19412. Constructs are reason mask with the reasons.
  19413. </summary>
  19414. <param name="reasons">The reasons.</param>
  19415. </member>
  19416. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask.#ctor">
  19417. <summary>
  19418. A reason mask with no reason.
  19419. </summary>
  19420. </member>
  19421. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask.AllReasons">
  19422. <summary>
  19423. A mask with all revocation reasons.
  19424. </summary>
  19425. </member>
  19426. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask.AddReasons(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask)">
  19427. Adds all reasons from the reasons mask to this mask.
  19428. @param mask The reasons mask to add.
  19429. </member>
  19430. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask.IsAllReasons">
  19431. <summary>
  19432. Returns <code>true</code> if this reasons mask contains all possible
  19433. reasons.
  19434. </summary>
  19435. <returns>true if this reasons mask contains all possible reasons.
  19436. </returns>
  19437. </member>
  19438. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask.Intersect(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask)">
  19439. <summary>
  19440. Intersects this mask with the given reasons mask.
  19441. </summary>
  19442. <param name="mask">mask The mask to intersect with.</param>
  19443. <returns>The intersection of this and teh given mask.</returns>
  19444. </member>
  19445. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask.HasNewReasons(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask)">
  19446. <summary>
  19447. Returns <c>true</c> if the passed reasons mask has new reasons.
  19448. </summary>
  19449. <param name="mask">The reasons mask which should be tested for new reasons.</param>
  19450. <returns><c>true</c> if the passed reasons mask has new reasons.</returns>
  19451. </member>
  19452. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask.Reasons">
  19453. <summary>
  19454. Returns the reasons in this mask.
  19455. </summary>
  19456. </member>
  19457. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.ProcessCrlB2(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DistributionPoint,System.Object,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl)">
  19458. If the complete CRL includes an issuing distribution point (IDP) CRL
  19459. extension check the following:
  19460. <p>
  19461. (i) If the distribution point name is present in the IDP CRL extension
  19462. and the distribution field is present in the DP, then verify that one of
  19463. the names in the IDP matches one of the names in the DP. If the
  19464. distribution point name is present in the IDP CRL extension and the
  19465. distribution field is omitted from the DP, then verify that one of the
  19466. names in the IDP matches one of the names in the cRLIssuer field of the
  19467. DP.
  19468. </p>
  19469. <p>
  19470. (ii) If the onlyContainsUserCerts boolean is asserted in the IDP CRL
  19471. extension, verify that the certificate does not include the basic
  19472. constraints extension with the cA boolean asserted.
  19473. </p>
  19474. <p>
  19475. (iii) If the onlyContainsCACerts boolean is asserted in the IDP CRL
  19476. extension, verify that the certificate includes the basic constraints
  19477. extension with the cA boolean asserted.
  19478. </p>
  19479. <p>
  19480. (iv) Verify that the onlyContainsAttributeCerts boolean is not asserted.
  19481. </p>
  19482. @param dp The distribution point.
  19483. @param cert The certificate.
  19484. @param crl The CRL.
  19485. @throws AnnotatedException if one of the conditions is not met or an error occurs.
  19486. </member>
  19487. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.ProcessCertBC(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator)">
  19488. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19489. </member>
  19490. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.PrepareNextCertA(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32)">
  19491. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19492. </member>
  19493. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.ProcessCertD(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32,System.Collections.Generic.ISet{System.String},Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixPolicyNode,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixPolicyNode}[],System.Int32)">
  19494. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19495. </member>
  19496. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.ProcessCrlB1(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DistributionPoint,System.Object,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl)">
  19497. If the DP includes cRLIssuer, then verify that the issuer field in the
  19498. complete CRL matches cRLIssuer in the DP and that the complete CRL
  19499. contains an
  19500. g distribution point extension with the indirectCRL
  19501. boolean asserted. Otherwise, verify that the CRL issuer matches the
  19502. certificate issuer.
  19503. @param dp The distribution point.
  19504. @param cert The certificate ot attribute certificate.
  19505. @param crl The CRL for <code>cert</code>.
  19506. @throws AnnotatedException if one of the above conditions does not apply or an error
  19507. occurs.
  19508. </member>
  19509. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.ProcessCrlF(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl,System.Object,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate})">
  19510. Obtain and validate the certification path for the complete CRL issuer.
  19511. If a key usage extension is present in the CRL issuer's certificate,
  19512. verify that the cRLSign bit is set.
  19513. @param crl CRL which contains revocation information for the certificate
  19514. <code>cert</code>.
  19515. @param cert The attribute certificate or certificate to check if it is
  19516. revoked.
  19517. @param defaultCRLSignCert The issuer certificate of the certificate <code>cert</code>.
  19518. @param defaultCRLSignKey The public key of the issuer certificate
  19519. <code>defaultCRLSignCert</code>.
  19520. @param paramsPKIX paramsPKIX PKIX parameters.
  19521. @param certPathCerts The certificates on the certification path.
  19522. @return A <code>Set</code> with all keys of possible CRL issuer
  19523. certificates.
  19524. @throws AnnotatedException if the CRL is not valid or the status cannot be checked or
  19525. some error occurs.
  19526. </member>
  19527. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.CheckCrl(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DistributionPoint,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.DateTime,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.CertStatus,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate})">
  19528. Checks a distribution point for revocation information for the
  19529. certificate <code>cert</code>.
  19530. @param dp The distribution point to consider.
  19531. @param paramsPKIX PKIX parameters.
  19532. @param cert Certificate to check if it is revoked.
  19533. @param validDate The date when the certificate revocation status should be
  19534. checked.
  19535. @param defaultCRLSignCert The issuer certificate of the certificate <code>cert</code>.
  19536. @param defaultCRLSignKey The public key of the issuer certificate
  19537. <code>defaultCRLSignCert</code>.
  19538. @param certStatus The current certificate revocation status.
  19539. @param reasonMask The reasons mask which is already checked.
  19540. @param certPathCerts The certificates of the certification path.
  19541. @throws AnnotatedException if the certificate is revoked or the status cannot be checked
  19542. or some error occurs.
  19543. </member>
  19544. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.CheckCrls(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.DateTime,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate})">
  19545. Checks a certificate if it is revoked.
  19546. @param paramsPKIX PKIX parameters.
  19547. @param cert Certificate to check if it is revoked.
  19548. @param validDate The date when the certificate revocation status should be
  19549. checked.
  19550. @param sign The issuer certificate of the certificate <code>cert</code>.
  19551. @param workingPublicKey The public key of the issuer certificate <code>sign</code>.
  19552. @param certPathCerts The certificates of the certification path.
  19553. @throws AnnotatedException if the certificate is revoked or the status cannot be checked
  19554. or some error occurs.
  19555. </member>
  19556. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.PrepareCertB(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixPolicyNode}[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixPolicyNode,System.Int32)">
  19557. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19558. </member>
  19559. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.PrepareNextCertI2(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32,System.Int32)">
  19560. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19561. </member>
  19562. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.PrepareNextCertG(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixNameConstraintValidator)">
  19563. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19564. </member>
  19565. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.PrepareNextCertJ(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32,System.Int32)">
  19566. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19567. </member>
  19568. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.PrepareNextCertK(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32)">
  19569. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19570. </member>
  19571. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.PrepareNextCertL(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32,System.Int32)">
  19572. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19573. </member>
  19574. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.PrepareNextCertM(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32,System.Int32)">
  19575. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19576. </member>
  19577. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.PrepareNextCertN(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32)">
  19578. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19579. </member>
  19580. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.PrepareNextCertO(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32,System.Collections.Generic.ISet{System.String},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathChecker})">
  19581. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19582. </member>
  19583. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.WrapupCertB(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32,System.Int32)">
  19584. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19585. </member>
  19586. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.WrapupCertF(Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPath,System.Int32,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathChecker},System.Collections.Generic.ISet{System.String})">
  19587. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixCertPathValidatorException"/>
  19588. </member>
  19589. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.ProcessCrlC(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters)">
  19590. If use-deltas is set, verify the issuer and scope of the delta CRL.
  19591. @param deltaCRL The delta CRL.
  19592. @param completeCRL The complete CRL.
  19593. @param pkixParams The PKIX paramaters.
  19594. @throws AnnotatedException if an exception occurs.
  19595. </member>
  19596. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3281CertPathUtilities.CheckCrls(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.DateTime,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate})">
  19597. Checks if an attribute certificate is revoked.
  19598. @param attrCert Attribute certificate to check if it is revoked.
  19599. @param paramsPKIX PKIX parameters.
  19600. @param issuerCert The issuer certificate of the attribute certificate
  19601. <code>attrCert</code>.
  19602. @param validDate The date when the certificate revocation status should
  19603. be checked.
  19604. @param certPathCerts The certificates of the certification path to be
  19605. checked.
  19606. @throws CertPathValidatorException if the certificate is revoked or the
  19607. status cannot be checked or some error occurs.
  19608. </member>
  19609. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3281CertPathUtilities.ProcessAttrCert1(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters)">
  19610. Searches for a holder public key certificate and verifies its
  19611. certification path.
  19612. @param attrCert the attribute certificate.
  19613. @param pkixParams The PKIX parameters.
  19614. @return The certificate path of the holder certificate.
  19615. @throws Exception if
  19616. <ul>
  19617. <li>no public key certificate can be found although holder
  19618. information is given by an entity name or a base certificate
  19619. ID</li>
  19620. <li>support classes cannot be created</li>
  19621. <li>no certification path for the public key certificate can
  19622. be built</li>
  19623. </ul>
  19624. </member>
  19625. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.Rfc3281CertPathUtilities.CheckCrl(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.DistributionPoint,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.PkixParameters,System.DateTime,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.CertStatus,Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.ReasonsMask,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate})">
  19626. Checks a distribution point for revocation information for the
  19627. certificate <code>attrCert</code>.
  19628. @param dp The distribution point to consider.
  19629. @param attrCert The attribute certificate which should be checked.
  19630. @param paramsPKIX PKIX parameters.
  19631. @param validDate The date when the certificate revocation status should
  19632. be checked.
  19633. @param issuerCert Certificate to check if it is revoked.
  19634. @param reasonMask The reasons mask which is already checked.
  19635. @param certPathCerts The certificates of the certification path to be
  19636. checked.
  19637. @throws Exception if the certificate is revoked or the status
  19638. cannot be checked or some error occurs.
  19639. </member>
  19640. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor">
  19641. <summary>
  19642. A trust anchor or most-trusted Certification Authority (CA).
  19643. This class represents a "most-trusted CA", which is used as a trust anchor
  19644. for validating X.509 certification paths. A most-trusted CA includes the
  19645. public key of the CA, the CA's name, and any constraints upon the set of
  19646. paths which may be validated using this key. These parameters can be
  19647. specified in the form of a trusted X509Certificate or as individual
  19648. parameters.
  19649. </summary>
  19650. </member>
  19651. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.Byte[])">
  19652. <summary>
  19653. Creates an instance of TrustAnchor with the specified X509Certificate and
  19654. optional name constraints, which are intended to be used as additional
  19655. constraints when validating an X.509 certification path.
  19656. The name constraints are specified as a byte array. This byte array
  19657. should contain the DER encoded form of the name constraints, as they
  19658. would appear in the NameConstraints structure defined in RFC 2459 and
  19659. X.509. The ASN.1 definition of this structure appears below.
  19660. <pre>
  19661. NameConstraints ::= SEQUENCE {
  19662. permittedSubtrees [0] GeneralSubtrees OPTIONAL,
  19663. excludedSubtrees [1] GeneralSubtrees OPTIONAL }
  19664. GeneralSubtrees ::= SEQUENCE SIZE (1..MAX) OF GeneralSubtree
  19665. GeneralSubtree ::= SEQUENCE {
  19666. base GeneralName,
  19667. minimum [0] BaseDistance DEFAULT 0,
  19668. maximum [1] BaseDistance OPTIONAL }
  19669. BaseDistance ::= INTEGER (0..MAX)
  19670. GeneralName ::= CHOICE {
  19671. otherName [0] OtherName,
  19672. rfc822Name [1] IA5String,
  19673. dNSName [2] IA5String,
  19674. x400Address [3] ORAddress,
  19675. directoryName [4] Name,
  19676. ediPartyName [5] EDIPartyName,
  19677. uniformResourceIdentifier [6] IA5String,
  19678. iPAddress [7] OCTET STRING,
  19679. registeredID [8] OBJECT IDENTIFIER}
  19680. </pre>
  19681. Note that the name constraints byte array supplied is cloned to protect
  19682. against subsequent modifications.
  19683. </summary>
  19684. <param name="trustedCert">a trusted X509Certificate</param>
  19685. <param name="nameConstraints">a byte array containing the ASN.1 DER encoding of a
  19686. NameConstraints extension to be used for checking name
  19687. constraints. Only the value of the extension is included, not
  19688. the OID or criticality flag. Specify null to omit the
  19689. parameter.</param>
  19690. <exception cref="T:System.ArgumentNullException">if the specified X509Certificate is null</exception>
  19691. </member>
  19692. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[])">
  19693. <summary>
  19694. Creates an instance of <c>TrustAnchor</c> where the
  19695. most-trusted CA is specified as an X500Principal and public key.
  19696. </summary>
  19697. <remarks>
  19698. <p>
  19699. Name constraints are an optional parameter, and are intended to be used
  19700. as additional constraints when validating an X.509 certification path.
  19701. </p><p>
  19702. The name constraints are specified as a byte array. This byte array
  19703. contains the DER encoded form of the name constraints, as they
  19704. would appear in the NameConstraints structure defined in RFC 2459
  19705. and X.509. The ASN.1 notation for this structure is supplied in the
  19706. documentation for the other constructors.
  19707. </p><p>
  19708. Note that the name constraints byte array supplied here is cloned to
  19709. protect against subsequent modifications.
  19710. </p>
  19711. </remarks>
  19712. <param name="caPrincipal">the name of the most-trusted CA as X509Name</param>
  19713. <param name="pubKey">the public key of the most-trusted CA</param>
  19714. <param name="nameConstraints">
  19715. a byte array containing the ASN.1 DER encoding of a NameConstraints extension to
  19716. be used for checking name constraints. Only the value of the extension is included,
  19717. not the OID or criticality flag. Specify <c>null</c> to omit the parameter.
  19718. </param>
  19719. <exception cref="T:System.ArgumentNullException">
  19720. if <c>caPrincipal</c> or <c>pubKey</c> is null
  19721. </exception>
  19722. </member>
  19723. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[])">
  19724. <summary>
  19725. Creates an instance of <code>TrustAnchor</code> where the most-trusted
  19726. CA is specified as a distinguished name and public key. Name constraints
  19727. are an optional parameter, and are intended to be used as additional
  19728. constraints when validating an X.509 certification path.
  19729. <br/>
  19730. The name constraints are specified as a byte array. This byte array
  19731. contains the DER encoded form of the name constraints, as they would
  19732. appear in the NameConstraints structure defined in RFC 2459 and X.509.
  19733. </summary>
  19734. <param name="caName">the X.500 distinguished name of the most-trusted CA in RFC
  19735. 2253 string format</param>
  19736. <param name="pubKey">the public key of the most-trusted CA</param>
  19737. <param name="nameConstraints">a byte array containing the ASN.1 DER encoding of a
  19738. NameConstraints extension to be used for checking name
  19739. constraints. Only the value of the extension is included, not
  19740. the OID or criticality flag. Specify null to omit the
  19741. parameter.</param>
  19742. throws NullPointerException, IllegalArgumentException
  19743. </member>
  19744. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor.TrustedCert">
  19745. <summary>
  19746. Returns the most-trusted CA certificate.
  19747. </summary>
  19748. </member>
  19749. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor.CA">
  19750. <summary>
  19751. Returns the name of the most-trusted CA as an X509Name.
  19752. </summary>
  19753. </member>
  19754. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor.CAName">
  19755. <summary>
  19756. Returns the name of the most-trusted CA in RFC 2253 string format.
  19757. </summary>
  19758. </member>
  19759. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor.CAPublicKey">
  19760. <summary>
  19761. Returns the public key of the most-trusted CA.
  19762. </summary>
  19763. </member>
  19764. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor.setNameConstraints(System.Byte[])">
  19765. <summary>
  19766. Decode the name constraints and clone them if not null.
  19767. </summary>
  19768. </member>
  19769. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix.TrustAnchor.ToString">
  19770. <summary>
  19771. Returns a formatted string describing the <code>TrustAnchor</code>.
  19772. </summary>
  19773. <returns>a formatted string describing the <code>TrustAnchor</code></returns>
  19774. </member>
  19775. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient">
  19776. <summary>Base class for a TLS client.</summary>
  19777. </member>
  19778. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.AllowUnexpectedServerExtension(System.Int32,System.Byte[])">
  19779. <exception cref="T:System.IO.IOException"/>
  19780. </member>
  19781. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.CheckForUnexpectedServerExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int32)">
  19782. <exception cref="T:System.IO.IOException"/>
  19783. </member>
  19784. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.GetPskIdentity">
  19785. <exception cref="T:System.IO.IOException"/>
  19786. </member>
  19787. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.GetSrpIdentity">
  19788. <exception cref="T:System.IO.IOException"/>
  19789. </member>
  19790. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.GetMultiCertStatusRequest">
  19791. <returns>an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequestItemV2"/> (or null).</returns>
  19792. </member>
  19793. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.GetSupportedGroups(System.Collections.Generic.IList{System.Int32})">
  19794. <summary>The default <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.GetClientExtensions"/> implementation calls this to determine which named
  19795. groups to include in the supported_groups extension for the ClientHello.</summary>
  19796. <param name="namedGroupRoles">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NamedGroupRole">named group roles</see> for which there should
  19797. be at least one supported group. By default this is inferred from the offered cipher suites and signature
  19798. algorithms.</param>
  19799. <returns>an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:System.Int32"/>. See <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NamedGroup"/> for group constants.
  19800. </returns>
  19801. </member>
  19802. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.NotifyHandshakeBeginning">
  19803. <exception cref="T:System.IO.IOException"/>
  19804. </member>
  19805. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.GetClientExtensions">
  19806. <exception cref="T:System.IO.IOException"/>
  19807. </member>
  19808. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.NotifyServerVersion(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion)">
  19809. <exception cref="T:System.IO.IOException"/>
  19810. </member>
  19811. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.NotifySelectedPsk(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPsk)">
  19812. <exception cref="T:System.IO.IOException"/>
  19813. </member>
  19814. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.ProcessServerExtensions(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  19815. <exception cref="T:System.IO.IOException"/>
  19816. </member>
  19817. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.ProcessServerSupplementalData(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SupplementalDataEntry})">
  19818. <exception cref="T:System.IO.IOException"/>
  19819. </member>
  19820. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.GetClientSupplementalData">
  19821. <exception cref="T:System.IO.IOException"/>
  19822. </member>
  19823. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsClient.NotifyNewSessionTicket(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NewSessionTicket)">
  19824. <exception cref="T:System.IO.IOException"/>
  19825. </member>
  19826. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsContext.HandshakeBeginning(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer)">
  19827. <exception cref="T:System.IO.IOException"/>
  19828. </member>
  19829. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsContext.HandshakeComplete(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSession)">
  19830. <exception cref="T:System.IO.IOException"/>
  19831. </member>
  19832. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsKeyExchange">
  19833. <summary>Base class for supporting a TLS key exchange implementation.</summary>
  19834. </member>
  19835. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsKeyExchangeFactory">
  19836. <summary>Base class for supporting a TLS key exchange factory implementation.</summary>
  19837. </member>
  19838. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsPeer">
  19839. <summary>Base class for a TLS client or server.</summary>
  19840. </member>
  19841. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsPeer.GetSupportedVersions">
  19842. <summary>Get the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion"/> values that are supported by this peer.</summary>
  19843. <remarks>
  19844. WARNING: Mixing DTLS and TLS versions in the returned array is currently NOT supported. Use a separate
  19845. (sub-)class for each case.
  19846. </remarks>
  19847. <returns>an array of supported <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion"/> values.</returns>
  19848. </member>
  19849. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsPeer.Cancel">
  19850. <exception cref="T:System.IO.IOException"/>
  19851. </member>
  19852. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsPeer.NotifyHandshakeBeginning">
  19853. <exception cref="T:System.IO.IOException"/>
  19854. </member>
  19855. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsPeer.NotifySecureRenegotiation(System.Boolean)">
  19856. <exception cref="T:System.IO.IOException"/>
  19857. </member>
  19858. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsPeer.GetKeyExchangeFactory">
  19859. <exception cref="T:System.IO.IOException"/>
  19860. </member>
  19861. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsPeer.NotifyHandshakeComplete">
  19862. <exception cref="T:System.IO.IOException"/>
  19863. </member>
  19864. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsServer">
  19865. <summary>Base class for a TLS server.</summary>
  19866. </member>
  19867. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AbstractTlsServer.SelectCipherSuite(System.Int32)">
  19868. <exception cref="T:System.IO.IOException"/>
  19869. </member>
  19870. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription">
  19871. <summary>RFC 5246 7.2.</summary>
  19872. </member>
  19873. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.close_notify">
  19874. <summary>This message notifies the recipient that the sender will not send any more messages on this
  19875. connection.</summary>
  19876. <remarks>
  19877. Note that as of TLS 1.1, failure to properly close a connection no longer requires that a session not be
  19878. resumed. This is a change from TLS 1.0 ("The session becomes unresumable if any connection is terminated
  19879. without proper close_notify messages with level equal to warning.") to conform with widespread
  19880. implementation practice.
  19881. </remarks>
  19882. </member>
  19883. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.unexpected_message">
  19884. <summary>An inappropriate message was received.</summary>
  19885. <remarks>
  19886. This alert is always fatal and should never be observed in communication between proper implementations.
  19887. </remarks>
  19888. </member>
  19889. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.bad_record_mac">
  19890. <summary>This alert is returned if a record is received with an incorrect MAC.</summary>
  19891. <remarks>
  19892. This alert also MUST be returned if an alert is sent because a TLSCiphertext decrypted in an invalid way:
  19893. either it wasn't an even multiple of the block length, or its padding values, when checked, weren't
  19894. correct. This message is always fatal and should never be observed in communication between proper
  19895. implementations (except when messages were corrupted in the network).
  19896. </remarks>
  19897. </member>
  19898. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.decryption_failed">
  19899. <remarks>
  19900. This alert was used in some earlier versions of TLS, and may have permitted certain attacks against the CBC
  19901. mode [CBCATT]. It MUST NOT be sent by compliant implementations.
  19902. </remarks>
  19903. </member>
  19904. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.record_overflow">
  19905. <summary>A TLSCiphertext record was received that had a length more than 2^14+2048 bytes, or a record
  19906. decrypted to a TLSCompressed record with more than 2^14+1024 bytes.</summary>
  19907. <remarks>
  19908. This message is always fatal and should never be observed in communication between proper implementations
  19909. (except when messages were corrupted in the network).
  19910. </remarks>
  19911. </member>
  19912. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.decompression_failure">
  19913. <summary>The decompression function received improper input (e.g., data that would expand to excessive
  19914. length).</summary>
  19915. <remarks>
  19916. This message is always fatal and should never be observed in communication between proper implementations.
  19917. </remarks>
  19918. </member>
  19919. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.handshake_failure">
  19920. <summary>Reception of a handshake_failure alert message indicates that the sender was unable to negotiate
  19921. an acceptable set of security parameters given the options available.</summary>
  19922. <remarks>
  19923. This is a fatal error.
  19924. </remarks>
  19925. </member>
  19926. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.no_certificate">
  19927. <remarks>
  19928. This alert was used in SSLv3 but not any version of TLS. It MUST NOT be sent by compliant implementations.
  19929. </remarks>
  19930. </member>
  19931. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.bad_certificate">
  19932. <summary>A certificate was corrupt, contained signatures that did not verify correctly, etc.</summary>
  19933. </member>
  19934. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.unsupported_certificate">
  19935. <summary>A certificate was of an unsupported type.</summary>
  19936. </member>
  19937. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.certificate_revoked">
  19938. <summary>A certificate was revoked by its signer.</summary>
  19939. </member>
  19940. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.certificate_expired">
  19941. <summary>A certificate has expired or is not currently valid.</summary>
  19942. </member>
  19943. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.certificate_unknown">
  19944. <summary>Some other (unspecified) issue arose in processing the certificate, rendering it unacceptable.
  19945. </summary>
  19946. </member>
  19947. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.illegal_parameter">
  19948. <summary>A field in the handshake was out of range or inconsistent with other fields.</summary>
  19949. <remarks>
  19950. This message is always fatal.
  19951. </remarks>
  19952. </member>
  19953. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.unknown_ca">
  19954. <summary>A valid certificate chain or partial chain was received, but the certificate was not accepted
  19955. because the CA certificate could not be located or couldn't be matched with a known, trusted CA.</summary>
  19956. <remarks>
  19957. This message is always fatal.
  19958. </remarks>
  19959. </member>
  19960. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.access_denied">
  19961. <summary>A valid certificate was received, but when access control was applied, the sender decided not to
  19962. proceed with negotiation.</summary>
  19963. <remarks>
  19964. This message is always fatal.
  19965. </remarks>
  19966. </member>
  19967. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.decode_error">
  19968. <summary>A message could not be decoded because some field was out of the specified range or the length of
  19969. the message was incorrect.</summary>
  19970. <remarks>
  19971. This message is always fatal and should never be observed in communication between proper
  19972. implementations (except when messages were corrupted in the network).
  19973. </remarks>
  19974. </member>
  19975. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.decrypt_error">
  19976. <summary>A handshake cryptographic operation failed, including being unable to correctly verify a signature
  19977. or validate a Finished message.</summary>
  19978. <remarks>
  19979. This message is always fatal.
  19980. </remarks>
  19981. </member>
  19982. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.export_restriction">
  19983. <remarks>
  19984. This alert was used in some earlier versions of TLS. It MUST NOT be sent by compliant implementations.
  19985. </remarks>
  19986. </member>
  19987. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.protocol_version">
  19988. <summary>The protocol version the client has attempted to negotiate is recognized but not supported.
  19989. </summary>
  19990. <remarks>
  19991. (For example, old protocol versions might be avoided for security reasons.) This message is always fatal.
  19992. </remarks>
  19993. </member>
  19994. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.insufficient_security">
  19995. <summary>Returned instead of handshake_failure when a negotiation has failed specifically because the
  19996. server requires ciphers more secure than those supported by the client.</summary>
  19997. <remarks>
  19998. This message is always fatal.
  19999. </remarks>
  20000. </member>
  20001. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.internal_error">
  20002. <summary>An internal error unrelated to the peer or the correctness of the protocol (such as a memory
  20003. allocation failure) makes it impossible to continue.</summary>
  20004. <remarks>
  20005. This message is always fatal.
  20006. </remarks>
  20007. </member>
  20008. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.user_canceled">
  20009. <summary>This handshake is being canceled for some reason unrelated to a protocol failure.</summary>
  20010. <remarks>
  20011. If the user cancels an operation after the handshake is complete, just closing the connection by sending a
  20012. close_notify is more appropriate. This alert should be followed by a close_notify. This message is
  20013. generally a warning.
  20014. </remarks>
  20015. </member>
  20016. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.no_renegotiation">
  20017. <summary>Sent by the client in response to a hello request or by the server in response to a client hello
  20018. after initial handshaking.</summary>
  20019. <remarks>
  20020. Either of these would normally lead to renegotiation; when that is not appropriate, the recipient should
  20021. respond with this alert. At that point, the original requester can decide whether to proceed with the
  20022. connection. One case where this would be appropriate is where a server has spawned a process to satisfy a
  20023. request; the process might receive security parameters (key length, authentication, etc.) at startup, and
  20024. it might be difficult to communicate changes to these parameters after that point. This message is always a
  20025. warning.
  20026. </remarks>
  20027. </member>
  20028. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.unsupported_extension">
  20029. <summary>Sent by clients that receive an extended server hello containing an extension that they did not
  20030. put in the corresponding client hello.</summary>
  20031. <remarks>
  20032. This message is always fatal.
  20033. </remarks>
  20034. </member>
  20035. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.certificate_unobtainable">
  20036. <summary>This alert is sent by servers who are unable to retrieve a certificate chain from the URL supplied
  20037. by the client(see Section 3.3).</summary>
  20038. <remarks>
  20039. This message MAY be fatal - for example if client authentication is required by the server for the
  20040. handshake to continue and the server is unable to retrieve the certificate chain, it may send a fatal
  20041. alert.
  20042. </remarks>
  20043. </member>
  20044. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.unrecognized_name">
  20045. <summary>This alert is sent by servers that receive a server_name extension request, but do not recognize
  20046. the server name.</summary>
  20047. <remarks>
  20048. This message MAY be fatal.
  20049. </remarks>
  20050. </member>
  20051. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.bad_certificate_status_response">
  20052. <summary>This alert is sent by clients that receive an invalid certificate status response (see Section 3.6
  20053. ).</summary>
  20054. <remarks>
  20055. This message is always fatal.
  20056. </remarks>
  20057. </member>
  20058. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.bad_certificate_hash_value">
  20059. <summary>This alert is sent by servers when a certificate hash does not match a client provided
  20060. certificate_hash.</summary>
  20061. <remarks>
  20062. This message is always fatal.
  20063. </remarks>
  20064. </member>
  20065. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.unknown_psk_identity">
  20066. <summary>If the server does not recognize the PSK identity, it MAY respond with an "unknown_psk_identity"
  20067. alert message.</summary>
  20068. </member>
  20069. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.no_application_protocol">
  20070. <summary>In the event that the server supports no protocols that the client advertises, then the server
  20071. SHALL respond with a fatal "no_application_protocol" alert.</summary>
  20072. </member>
  20073. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.inappropriate_fallback">
  20074. <summary>If TLS_FALLBACK_SCSV appears in ClientHello.cipher_suites and the highest protocol version
  20075. supported by the server is higher than the version indicated in ClientHello.client_version, the server MUST
  20076. respond with a fatal inappropriate_fallback alert[..].</summary>
  20077. </member>
  20078. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.missing_extension">
  20079. <summary>Sent by endpoints that receive a handshake message not containing an extension that is mandatory
  20080. to send for the offered TLS version or other negotiated parameters.</summary>
  20081. </member>
  20082. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.certificate_required">
  20083. <summary>Sent by servers when a client certificate is desired but none was provided by the client.
  20084. </summary>
  20085. </member>
  20086. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertLevel">
  20087. <summary>RFC 5246 7.2</summary>
  20088. </member>
  20089. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.BasicTlsPskIdentity">
  20090. <summary>A basic PSK Identity holder.</summary>
  20091. </member>
  20092. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.BasicTlsSrpIdentity">
  20093. <summary>A basic SRP Identity holder.</summary>
  20094. </member>
  20095. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue">
  20096. <summary>A queue for bytes. This file could be more optimized.</summary>
  20097. </member>
  20098. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue.GetAllocationSize(System.Int32)">
  20099. <returns>The smallest number which can be written as 2^x which is bigger than i.</returns>
  20100. </member>
  20101. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue.m_databuf">
  20102. <summary>The buffer where we store our data.</summary>
  20103. </member>
  20104. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue.m_skipped">
  20105. <summary>How many bytes at the beginning of the buffer are skipped.</summary>
  20106. </member>
  20107. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue.m_available">
  20108. <summary>How many bytes in the buffer are valid data.</summary>
  20109. </member>
  20110. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue.AddData(System.Byte[],System.Int32,System.Int32)">
  20111. <summary>Add some data to our buffer.</summary>
  20112. <param name="buf">A byte-array to read data from.</param>
  20113. <param name="off">How many bytes to skip at the beginning of the array.</param>
  20114. <param name="len">How many bytes to read from the array.</param>
  20115. </member>
  20116. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue.Available">
  20117. <returns>The number of bytes which are available in this buffer.</returns>
  20118. </member>
  20119. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue.CopyTo(System.IO.Stream,System.Int32)">
  20120. <summary>Copy some bytes from the beginning of the data to the provided <see cref="T:System.IO.Stream"/>.</summary>
  20121. <param name="output">The <see cref="T:System.IO.Stream"/> to copy the bytes to.</param>
  20122. <param name="length">How many bytes to copy.</param>
  20123. </member>
  20124. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue.Read(System.Byte[],System.Int32,System.Int32,System.Int32)">
  20125. <summary>Read data from the buffer.</summary>
  20126. <param name="buf">The buffer where the read data will be copied to.</param>
  20127. <param name="offset">How many bytes to skip at the beginning of buf.</param>
  20128. <param name="len">How many bytes to read at all.</param>
  20129. <param name="skip">How many bytes from our data to skip.</param>
  20130. </member>
  20131. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue.ReadHandshakeMessage(System.Int32)">
  20132. <summary>Return a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HandshakeMessageInput"/> over some bytes at the beginning of the data.
  20133. </summary>
  20134. <param name="length">How many bytes will be readable.</param>
  20135. <returns>A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HandshakeMessageInput"/> over the data.</returns>
  20136. </member>
  20137. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue.RemoveData(System.Int32)">
  20138. <summary>Remove some bytes from our data from the beginning.</summary>
  20139. <param name="i">How many bytes to remove.</param>
  20140. </member>
  20141. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue.RemoveData(System.Byte[],System.Int32,System.Int32,System.Int32)">
  20142. <summary>Remove data from the buffer.</summary>
  20143. <param name="buf">The buffer where the removed data will be copied to.</param>
  20144. <param name="off">How many bytes to skip at the beginning of buf.</param>
  20145. <param name="len">How many bytes to read at all.</param>
  20146. <param name="skip">How many bytes from our data to skip.</param>
  20147. </member>
  20148. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueueOutputStream">
  20149. <summary>OutputStream based on a ByteQueue implementation.</summary>
  20150. </member>
  20151. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertChainType">
  20152. <summary>Implementation of the RFC 3546 3.3. CertChainType.</summary>
  20153. </member>
  20154. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate">
  20155. <summary>Parsing and encoding of a <i>Certificate</i> struct from RFC 4346.</summary>
  20156. <remarks>
  20157. <pre>
  20158. opaque ASN.1Cert&lt;2^24-1&gt;;
  20159. struct {
  20160. ASN.1Cert certificate_list&lt;0..2^24-1&gt;;
  20161. } Certificate;
  20162. </pre>
  20163. </remarks>
  20164. </member>
  20165. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate.GetCertificateList">
  20166. <returns>an array of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate"/> representing a certificate chain.</returns>
  20167. </member>
  20168. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate.IsEmpty">
  20169. <returns><c>true</c> if this certificate chain contains no certificates, or <c>false</c> otherwise.
  20170. </returns>
  20171. </member>
  20172. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate.Encode(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream,System.IO.Stream)">
  20173. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate"/> to a <see cref="T:System.IO.Stream"/>, and optionally calculate the
  20174. "end point hash" (per RFC 5929's tls-server-end-point binding).</summary>
  20175. <param name="context">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  20176. <param name="messageOutput">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  20177. <param name="endPointHashOutput">the <see cref="T:System.IO.Stream"/> to write the "end point hash" to (or null).
  20178. </param>
  20179. <exception cref="T:System.IO.IOException"/>
  20180. </member>
  20181. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate.Parse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate.ParseOptions,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream,System.IO.Stream)">
  20182. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  20183. <param name="options">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate.ParseOptions"/> to apply during parsing.</param>
  20184. <param name="context">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  20185. <param name="messageInput">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  20186. <param name="endPointHashOutput">the <see cref="T:System.IO.Stream"/> to write the "end point hash" to (or null).
  20187. </param>
  20188. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate"/> object.</returns>
  20189. <exception cref="T:System.IO.IOException"/>
  20190. </member>
  20191. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateCompressionAlgorithm">
  20192. RFC 8879
  20193. </member>
  20194. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest">
  20195. <summary>Parsing and encoding of a <i>CertificateRequest</i> struct from RFC 4346.</summary>
  20196. <remarks>
  20197. <pre>
  20198. struct {
  20199. ClientCertificateType certificate_types&lt;1..2^8-1&gt;;
  20200. DistinguishedName certificate_authorities&lt;3..2^16-1&gt;;
  20201. } CertificateRequest;
  20202. </pre>
  20203. Updated for RFC 5246:
  20204. <pre>
  20205. struct {
  20206. ClientCertificateType certificate_types &lt;1..2 ^ 8 - 1&gt;;
  20207. SignatureAndHashAlgorithm supported_signature_algorithms &lt;2 ^ 16 - 1&gt;;
  20208. DistinguishedName certificate_authorities &lt;0..2 ^ 16 - 1&gt;;
  20209. } CertificateRequest;
  20210. </pre>
  20211. Revised for RFC 8446:
  20212. <pre>
  20213. struct {
  20214. opaque certificate_request_context &lt;0..2 ^ 8 - 1&gt;;
  20215. Extension extensions &lt;2..2 ^ 16 - 1&gt;;
  20216. } CertificateRequest;
  20217. </pre>
  20218. </remarks>
  20219. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientCertificateType"/>
  20220. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name"/>
  20221. </member>
  20222. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest.CheckSupportedSignatureAlgorithms(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm},System.Int16)">
  20223. <exception cref="T:System.IO.IOException"/>
  20224. </member>
  20225. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest.#ctor(System.Int16[],System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name})">
  20226. <param name="certificateTypes">see <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientCertificateType"/> for valid constants.</param>
  20227. <param name="supportedSignatureAlgorithms"></param>
  20228. <param name="certificateAuthorities">an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name"/>.</param>
  20229. </member>
  20230. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest.#ctor(System.Byte[],System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name})">
  20231. <exception cref="T:System.IO.IOException"/>
  20232. </member>
  20233. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest.CertificateTypes">
  20234. <returns>an array of certificate types</returns>
  20235. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientCertificateType"/>
  20236. </member>
  20237. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest.SupportedSignatureAlgorithms">
  20238. <returns>an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/> (or null before TLS 1.2).
  20239. </returns>
  20240. </member>
  20241. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest.SupportedSignatureAlgorithmsCert">
  20242. <returns>an optional <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/>. May be non-null from
  20243. TLS 1.3 onwards.</returns>
  20244. </member>
  20245. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest.CertificateAuthorities">
  20246. <returns>an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name"/>.</returns>
  20247. </member>
  20248. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest.Encode(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  20249. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  20250. <param name="context">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  20251. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  20252. <exception cref="T:System.IO.IOException"/>
  20253. </member>
  20254. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest.Parse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  20255. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest"/> from a <see cref="T:System.IO.Stream"/></summary>
  20256. <param name="context">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  20257. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  20258. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest"/> object.</returns>
  20259. <exception cref="T:System.IO.IOException"/>
  20260. </member>
  20261. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus.OcspResponseList">
  20262. <summary>an <see cref="T:System.Collections.Generic.IList`1"/> of (possibly null) <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.OcspResponse"/>.</summary>
  20263. </member>
  20264. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus.Encode(System.IO.Stream)">
  20265. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  20266. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  20267. <exception cref="T:System.IO.IOException"/>
  20268. </member>
  20269. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus.Parse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  20270. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  20271. <param name="context">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  20272. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  20273. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus"/> object.</returns>
  20274. <exception cref="T:System.IO.IOException"/>
  20275. </member>
  20276. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus.ParseOcspResponse(System.Byte[])">
  20277. <exception cref="T:System.IO.IOException"/>
  20278. </member>
  20279. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus.RequireStatusRequestVersion(System.Int32,System.Int32)">
  20280. <exception cref="T:System.IO.IOException"/>
  20281. </member>
  20282. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequest">
  20283. <summary>Implementation of the RFC 3546 3.6. CertificateStatusRequest.</summary>
  20284. </member>
  20285. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequest.Encode(System.IO.Stream)">
  20286. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequest"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  20287. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  20288. <exception cref="T:System.IO.IOException"/>
  20289. </member>
  20290. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequest.Parse(System.IO.Stream)">
  20291. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequest"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  20292. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  20293. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequest"/> object.</returns>
  20294. <exception cref="T:System.IO.IOException"/>
  20295. </member>
  20296. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequestItemV2">
  20297. <summary>Implementation of the RFC 6961 2.2. CertificateStatusRequestItemV2.</summary>
  20298. </member>
  20299. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequestItemV2.Encode(System.IO.Stream)">
  20300. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequestItemV2"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  20301. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  20302. <exception cref="T:System.IO.IOException"/>
  20303. </member>
  20304. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequestItemV2.Parse(System.IO.Stream)">
  20305. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequestItemV2"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  20306. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  20307. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequestItemV2"/> object.</returns>
  20308. <exception cref="T:System.IO.IOException"/>
  20309. </member>
  20310. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateType">
  20311. <summary>RFC 6091</summary>
  20312. </member>
  20313. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateUrl">
  20314. <summary>RFC 3546 3.3</summary>
  20315. </member>
  20316. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateUrl.#ctor(System.Int16,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UrlAndHash})">
  20317. <param name="type">see <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertChainType"/> for valid constants.</param>
  20318. <param name="urlAndHashList">an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UrlAndHash"/>.</param>
  20319. </member>
  20320. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateUrl.Type">
  20321. <returns><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertChainType"/></returns>
  20322. </member>
  20323. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateUrl.UrlAndHashList">
  20324. <returns>an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UrlAndHash"/>.</returns>
  20325. </member>
  20326. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateUrl.Encode(System.IO.Stream)">
  20327. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateUrl"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  20328. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  20329. <exception cref="T:System.IO.IOException"/>
  20330. </member>
  20331. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateUrl.Parse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  20332. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateUrl"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  20333. <param name="context">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  20334. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  20335. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateUrl"/> object.</returns>
  20336. <exception cref="T:System.IO.IOException"/>
  20337. </member>
  20338. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateVerify.Algorithm">
  20339. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureScheme"/> value.</returns>
  20340. </member>
  20341. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateVerify.Encode(System.IO.Stream)">
  20342. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateVerify"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  20343. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  20344. <exception cref="T:System.IO.IOException"/>
  20345. </member>
  20346. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateVerify.Parse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  20347. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateVerify"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  20348. <param name="context">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  20349. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  20350. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateVerify"/> object.</returns>
  20351. <exception cref="T:System.IO.IOException"/>
  20352. </member>
  20353. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ChannelBinding">
  20354. <summary>RFC 5056</summary>
  20355. <remarks>
  20356. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  20357. particular values (e.g.serialization).
  20358. </remarks>
  20359. </member>
  20360. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CipherSuite">
  20361. <summary>RFC 2246 A.5</summary>
  20362. </member>
  20363. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CipherType">
  20364. <summary>RFC 2246</summary>
  20365. <remarks>
  20366. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  20367. particular values (e.g. serialization).
  20368. </remarks>
  20369. </member>
  20370. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientHello.Encode(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  20371. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientHello"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  20372. <param name="context">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  20373. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  20374. <exception cref="T:System.IO.IOException"/>
  20375. </member>
  20376. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientHello.Parse(System.IO.MemoryStream,System.IO.Stream)">
  20377. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientHello"/> from a <see cref="T:System.IO.MemoryStream"/>.</summary>
  20378. <param name="messageInput">the <see cref="T:System.IO.MemoryStream"/> to parse from.</param>
  20379. <param name="dtlsOutput">for DTLS this should be non-null; the input is copied to this
  20380. <see cref="T:System.IO.Stream"/>, minus the cookie field.</param>
  20381. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientHello"/> object.</returns>
  20382. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsFatalAlert"/>
  20383. </member>
  20384. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientHello.ImplParse(System.IO.MemoryStream,System.IO.Stream)">
  20385. <exception cref="T:System.IO.IOException"/>
  20386. </member>
  20387. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CombinedHash">
  20388. <summary>A combined hash, which implements md5(m) || sha1(m).</summary>
  20389. </member>
  20390. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CompressionMethod">
  20391. <summary>RFC 2246 6.1</summary>
  20392. </member>
  20393. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ConnectionEnd">
  20394. <summary>RFC 2246</summary>
  20395. <remarks>
  20396. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  20397. particular values(e.g.serialization).
  20398. </remarks>
  20399. </member>
  20400. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ContentType">
  20401. <summary>RFC 2246 6.2.1</summary>
  20402. </member>
  20403. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.DHGroup">
  20404. <summary>Carrier class for Diffie-Hellman group parameters.</summary>
  20405. </member>
  20406. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.DHGroup.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.Int32)">
  20407. <summary>Base constructor with the prime factor of (p - 1).</summary>
  20408. <param name="p">the prime modulus.</param>
  20409. <param name="q">specifies the prime factor of (p - 1).</param>
  20410. <param name="g">the base generator.</param>
  20411. <param name="l"></param>
  20412. </member>
  20413. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.DHStandardGroups">
  20414. <summary>Standard Diffie-Hellman groups from various IETF specifications.</summary>
  20415. </member>
  20416. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.AbstractTlsCrypto">
  20417. <summary>Base class for a TlsCrypto implementation that provides some needed methods from elsewhere in the impl
  20418. package.</summary>
  20419. </member>
  20420. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.AbstractTlsSecret">
  20421. <summary>Base class for a TlsSecret implementation which captures common code and fields.</summary>
  20422. </member>
  20423. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.AbstractTlsSecret.#ctor(System.Byte[])">
  20424. <summary>Base constructor.</summary>
  20425. <param name="data">the byte[] making up the secret value.</param>
  20426. </member>
  20427. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.AbstractTlsSecret.Encrypt(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsEncryptor)">
  20428. <exception cref="T:System.IO.IOException"/>
  20429. </member>
  20430. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcDefaultTlsCredentialedAgreement">
  20431. <summay>Credentialed class generating agreed secrets from a peer's public key for our end of the TLS connection
  20432. using the BC light-weight API.</summay>
  20433. </member>
  20434. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcDefaultTlsCredentialedDecryptor">
  20435. <summary>Credentialed class decrypting RSA encrypted secrets sent from a peer for our end of the TLS connection
  20436. using the BC light-weight API.</summary>
  20437. </member>
  20438. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcDefaultTlsCredentialedSigner">
  20439. <summary>Credentialed class for generating signatures based on the use of primitives from the BC light-weight API.</summary>
  20440. </member>
  20441. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcSsl3Hmac">
  20442. <summary>HMAC implementation based on original internet draft for HMAC (RFC 2104).</summary>
  20443. <remarks>
  20444. The difference is that padding is concatenated versus XORed with the key, e.g:
  20445. <code>H(K + opad, H(K + ipad, text))</code>
  20446. </remarks>
  20447. </member>
  20448. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcSsl3Hmac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IDigest)">
  20449. <summary>Base constructor for one of the standard digest algorithms for which the byteLength is known.
  20450. </summary>
  20451. <remarks>
  20452. Behaviour is undefined for digests other than MD5 or SHA1.
  20453. </remarks>
  20454. <param name="digest">the digest.</param>
  20455. </member>
  20456. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcSsl3Hmac.Reset">
  20457. Reset the mac generator.
  20458. </member>
  20459. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate">
  20460. <summary>Implementation class for a single X.509 certificate based on the BC light-weight API.</summary>
  20461. </member>
  20462. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.Convert(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCrypto,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate)">
  20463. <exception cref="T:System.IO.IOException"/>
  20464. </member>
  20465. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.ParseCertificate(System.Byte[])">
  20466. <exception cref="T:System.IO.IOException"/>
  20467. </member>
  20468. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCrypto,System.Byte[])">
  20469. <exception cref="T:System.IO.IOException"/>
  20470. </member>
  20471. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetEncoded">
  20472. <exception cref="T:System.IO.IOException"/>
  20473. </member>
  20474. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  20475. <exception cref="T:System.IO.IOException"/>
  20476. </member>
  20477. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCrypto">
  20478. Class for providing cryptographic services for TLS based on implementations in the BC light-weight API.
  20479. <p>
  20480. This class provides default implementations for everything. If you need to customise it, extend the class
  20481. and override the appropriate methods.
  20482. </p>
  20483. </member>
  20484. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDH">
  20485. <summary>Support class for ephemeral Diffie-Hellman using the BC light-weight library.</summary>
  20486. </member>
  20487. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDHDomain">
  20488. <summary>BC light-weight support class for Diffie-Hellman key pair generation and key agreement over a
  20489. specified Diffie-Hellman configuration.</summary>
  20490. </member>
  20491. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDHDomain.DecodeParameter(System.Byte[])">
  20492. <exception cref="T:System.IO.IOException"/>
  20493. </member>
  20494. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDHDomain.DecodePublicKey(System.Byte[])">
  20495. <exception cref="T:System.IO.IOException"/>
  20496. </member>
  20497. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDsaSigner">
  20498. <summary>Implementation class for generation of the raw DSA signature type using the BC light-weight API.
  20499. </summary>
  20500. </member>
  20501. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDsaVerifier">
  20502. <summary>Implementation class for the verification of the raw DSA signature type using the BC light-weight API.
  20503. </summary>
  20504. </member>
  20505. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDssSigner">
  20506. <summary>BC light-weight base class for the signers implementing the two DSA style algorithms from FIPS PUB
  20507. 186-4: DSA and ECDSA.</summary>
  20508. </member>
  20509. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDssVerifier">
  20510. <summary>BC light-weight base class for the verifiers supporting the two DSA style algorithms from FIPS PUB
  20511. 186-4: DSA and ECDSA.</summary>
  20512. </member>
  20513. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDH">
  20514. <summary>Support class for ephemeral Elliptic Curve Diffie-Hellman using the BC light-weight library.</summary>
  20515. </member>
  20516. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDomain">
  20517. EC domain class for generating key pairs and performing key agreement.
  20518. </member>
  20519. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDomain.DecodePublicKey(System.Byte[])">
  20520. <exception cref="T:System.IO.IOException"/>
  20521. </member>
  20522. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDsa13Signer">
  20523. <summary>Implementation class for generation of ECDSA signatures in TLS 1.3+ using the BC light-weight API.
  20524. </summary>
  20525. </member>
  20526. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDsaSigner">
  20527. <summary>Implementation class for generation of the raw ECDSA signature type using the BC light-weight API.
  20528. </summary>
  20529. </member>
  20530. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDsaVerifier">
  20531. <summary>Implementation class for the verification of the raw ECDSA signature type using the BC light-weight
  20532. API.</summary>
  20533. </member>
  20534. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate">
  20535. <summary>Implementation class for a single X.509 certificate based on the BC light-weight API.</summary>
  20536. </member>
  20537. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCrypto,System.Byte[])">
  20538. <exception cref="T:System.IO.IOException"/>
  20539. </member>
  20540. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.CreateEncryptor(System.Int32)">
  20541. <exception cref="T:System.IO.IOException"/>
  20542. </member>
  20543. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.CreateVerifier(System.Int16)">
  20544. <exception cref="T:System.IO.IOException"/>
  20545. </member>
  20546. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.CreateVerifier(System.Int32)">
  20547. <exception cref="T:System.IO.IOException"/>
  20548. </member>
  20549. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.GetEncoded">
  20550. <exception cref="T:System.IO.IOException"/>
  20551. </member>
  20552. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.GetExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  20553. <exception cref="T:System.IO.IOException"/>
  20554. </member>
  20555. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.GetLegacySignatureAlgorithm">
  20556. <exception cref="T:System.IO.IOException"/>
  20557. </member>
  20558. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.GetPubKeyDH">
  20559. <exception cref="T:System.IO.IOException"/>
  20560. </member>
  20561. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.GetPubKeyDss">
  20562. <exception cref="T:System.IO.IOException"/>
  20563. </member>
  20564. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.GetPubKeyEC">
  20565. <exception cref="T:System.IO.IOException"/>
  20566. </member>
  20567. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.GetPubKeyEd25519">
  20568. <exception cref="T:System.IO.IOException"/>
  20569. </member>
  20570. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.GetPubKeyEd448">
  20571. <exception cref="T:System.IO.IOException"/>
  20572. </member>
  20573. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.GetPubKeyRsa">
  20574. <exception cref="T:System.IO.IOException"/>
  20575. </member>
  20576. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.SupportsSignatureAlgorithm(System.Int16)">
  20577. <exception cref="T:System.IO.IOException"/>
  20578. </member>
  20579. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.SupportsSignatureAlgorithmCA(System.Int16)">
  20580. <exception cref="T:System.IO.IOException"/>
  20581. </member>
  20582. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.CheckUsageInRole(System.Int32)">
  20583. <exception cref="T:System.IO.IOException"/>
  20584. </member>
  20585. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.GetPublicKey">
  20586. <exception cref="T:System.IO.IOException"/>
  20587. </member>
  20588. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.SupportsSignatureAlgorithm(System.Int16,System.Int32)">
  20589. <exception cref="T:System.IO.IOException"/>
  20590. </member>
  20591. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.ValidateKeyUsage(System.Int32)">
  20592. <exception cref="T:System.IO.IOException"/>
  20593. </member>
  20594. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.ValidateRsa_Pkcs1">
  20595. <exception cref="T:System.IO.IOException"/>
  20596. </member>
  20597. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.ValidateRsa_Pss_Pss(System.Int16)">
  20598. <exception cref="T:System.IO.IOException"/>
  20599. </member>
  20600. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRawKeyCertificate.ValidateRsa_Pss_Rsae">
  20601. <exception cref="T:System.IO.IOException"/>
  20602. </member>
  20603. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRsaPssSigner">
  20604. <summary>Operator supporting the generation of RSASSA-PSS signatures using the BC light-weight API.</summary>
  20605. </member>
  20606. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRsaPssVerifier">
  20607. <summary>Operator supporting the verification of RSASSA-PSS signatures using the BC light-weight API.</summary>
  20608. </member>
  20609. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRsaSigner">
  20610. <summary>Operator supporting the generation of RSASSA-PKCS1-v1_5 signatures using the BC light-weight API.
  20611. </summary>
  20612. </member>
  20613. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRsaVerifier">
  20614. <summary>Operator supporting the verification of RSASSA-PKCS1-v1_5 signatures using the BC light-weight API.
  20615. </summary>
  20616. </member>
  20617. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsSecret">
  20618. <summary>BC light-weight support class for handling TLS secrets and deriving key material and other secrets
  20619. from them.</summary>
  20620. </member>
  20621. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcX25519">
  20622. <summary>Support class for X25519 using the BC light-weight library.</summary>
  20623. </member>
  20624. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC.BcX448">
  20625. <summary>Support class for X448 using the BC light-weight library.</summary>
  20626. </member>
  20627. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipher">
  20628. <summary>A generic TLS 1.2 AEAD cipher.</summary>
  20629. </member>
  20630. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl,System.Int32,System.Int32,System.Int32)">
  20631. <exception cref="T:System.IO.IOException"/>
  20632. </member>
  20633. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl">
  20634. <summary>Base interface for services supporting AEAD encryption/decryption.</summary>
  20635. </member>
  20636. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl.SetKey(System.Byte[],System.Int32,System.Int32)">
  20637. <summary>Set the key to be used by the AEAD cipher implementation supporting this service.</summary>
  20638. <param name="key">array holding the AEAD cipher key.</param>
  20639. <param name="keyOff">offset into the array the key starts at.</param>
  20640. <param name="keyLen">length of the key in the array.</param>
  20641. <exception cref="T:System.IO.IOException"/>
  20642. </member>
  20643. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl.Init(System.Byte[],System.Int32,System.Byte[])">
  20644. <summary>Initialise the parameters for the AEAD operator.</summary>
  20645. <param name="nonce">the nonce.</param>
  20646. <param name="macSize">MAC size in bytes.</param>
  20647. <param name="additionalData">any additional data to be included in the MAC calculation.</param>
  20648. <exception cref="T:System.IO.IOException">if the parameters are inappropriate.</exception>
  20649. </member>
  20650. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl.GetOutputSize(System.Int32)">
  20651. <summary>Return the maximum size of the output for input of inputLength bytes.</summary>
  20652. <param name="inputLength">the length (in bytes) of the proposed input.</param>
  20653. <returns>the maximum size of the output.</returns>
  20654. </member>
  20655. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl.DoFinal(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  20656. <summary>Perform the cipher encryption/decryption returning the output in output.</summary>
  20657. <remarks>
  20658. Note: we have to use DoFinal() here as it is the only way to guarantee output from the underlying cipher.
  20659. </remarks>
  20660. <param name="input">array holding input data to the cipher.</param>
  20661. <param name="inputOffset">offset into input array data starts at.</param>
  20662. <param name="inputLength">length of the input data in the array.</param>
  20663. <param name="output">array to hold the cipher output.</param>
  20664. <param name="outputOffset">offset into output array to start saving output.</param>
  20665. <returns>the amount of data written to output.</returns>
  20666. <exception cref="T:System.IO.IOException">in case of failure.</exception>
  20667. </member>
  20668. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipher">
  20669. <summary>A generic TLS 1.0-1.2 block cipher. This can be used for AES or 3DES for example.</summary>
  20670. </member>
  20671. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHmac,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHmac,System.Int32)">
  20672. <exception cref="T:System.IO.IOException"/>
  20673. </member>
  20674. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl">
  20675. <summary>Interface for block cipher services.</summary>
  20676. </member>
  20677. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl.SetKey(System.Byte[],System.Int32,System.Int32)">
  20678. <summary>Set the key to be used by the block cipher implementation supporting this service.</summary>
  20679. <param name="key">array holding the block cipher key.</param>
  20680. <param name="keyOff">offset into the array the key starts at.</param>
  20681. <param name="keyLen">length of the key in the array.</param>
  20682. <exception cref="T:System.IO.IOException"/>
  20683. </member>
  20684. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl.Init(System.Byte[],System.Int32,System.Int32)">
  20685. <summary>Initialise the parameters for operator.</summary>
  20686. <param name="iv">array holding the initialization vector (IV).</param>
  20687. <param name="ivOff">offset into the array the IV starts at.</param>
  20688. <param name="ivLen">length of the IV in the array.</param>
  20689. <exception cref="T:System.IO.IOException">if the parameters are inappropriate.</exception>
  20690. </member>
  20691. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl.DoFinal(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  20692. <summary>Perform the cipher encryption/decryption returning the output in output.</summary>
  20693. <remarks>
  20694. Note: we have to use DoFinal() here as it is the only way to guarantee output from the underlying cipher.
  20695. </remarks>
  20696. <param name="input">array holding input data to the cipher.</param>
  20697. <param name="inputOffset">offset into input array data starts at.</param>
  20698. <param name="inputLength">length of the input data in the array.</param>
  20699. <param name="output">array to hold the cipher output.</param>
  20700. <param name="outputOffset">offset into output array to start saving output.</param>
  20701. <returns>the amount of data written to output.</returns>
  20702. <exception cref="T:System.IO.IOException">in case of failure.</exception>
  20703. </member>
  20704. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl.GetBlockSize">
  20705. <summary>Return the blocksize (in bytes) of the underlying block cipher.</summary>
  20706. <returns>the cipher's blocksize.</returns>
  20707. </member>
  20708. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsImplUtilities">
  20709. <summary>Useful utility methods.</summary>
  20710. </member>
  20711. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsNullCipher">
  20712. <summary>The NULL cipher.</summary>
  20713. </member>
  20714. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsNullCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHmac,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHmac)">
  20715. <exception cref="T:System.IO.IOException"/>
  20716. </member>
  20717. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteHmac">
  20718. <summary>A generic TLS MAC implementation, acting as an HMAC based on some underlying Digest.</summary>
  20719. </member>
  20720. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteHmac.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHmac)">
  20721. <summary>Generate a new instance of a TlsMac.</summary>
  20722. <param name="cryptoParams">the TLS client context specific crypto parameters.</param>
  20723. <param name="mac">The MAC to use.</param>
  20724. </member>
  20725. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteMac">
  20726. <summary>Base interface for a generic TLS MAC implementation for use with a bulk cipher.</summary>
  20727. </member>
  20728. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteMac.Size">
  20729. <summary>Return the output length (in bytes) of this MAC.</summary>
  20730. <returns>The output length of this MAC.</returns>
  20731. </member>
  20732. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteMac.CalculateMac(System.Int64,System.Int16,System.Byte[],System.Int32,System.Int32)">
  20733. <summary>Calculate the MAC for some given data.</summary>
  20734. <param name="seqNo">The sequence number of the record.</param>
  20735. <param name="type">The content type of the message.</param>
  20736. <param name="message">A byte array containing the message.</param>
  20737. <param name="offset">The number of bytes to skip, before the message starts.</param>
  20738. <param name="length">The length of the message.</param>
  20739. <returns>A new byte array containing the MAC value.</returns>
  20740. </member>
  20741. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteMac.CalculateMacConstantTime(System.Int64,System.Int16,System.Byte[],System.Int32,System.Int32,System.Int32,System.Byte[])">
  20742. <summary>Constant time calculation of the MAC for some given data with a given expected length.</summary>
  20743. <param name="seqNo">The sequence number of the record.</param>
  20744. <param name="type">The content type of the message.</param>
  20745. <param name="message">A byte array containing the message.</param>
  20746. <param name="offset">The number of bytes to skip, before the message starts.</param>
  20747. <param name="length">The length of the message.</param>
  20748. <param name="expectedLength">The expected length of the full message.</param>
  20749. <param name="randomData">Random data for padding out the MAC calculation if required.</param>
  20750. <returns>A new byte array containing the MAC value.</returns>
  20751. </member>
  20752. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Srp6Group">
  20753. <summary>Carrier class for SRP-6 group parameters.</summary>
  20754. </member>
  20755. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Srp6Group.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  20756. <summary>Base constructor.</summary>
  20757. <param name="n">the n value.</param>
  20758. <param name="g">the g value.</param>
  20759. </member>
  20760. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Srp6StandardGroups">
  20761. <summary>A selection of standard groups for SRP-6.</summary>
  20762. </member>
  20763. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Tls13Verifier.Stream">
  20764. <exception cref="T:System.IO.IOException"/>
  20765. </member>
  20766. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Tls13Verifier.VerifySignature(System.Byte[])">
  20767. <exception cref="T:System.IO.IOException"/>
  20768. </member>
  20769. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsAgreement">
  20770. <summary>Base interface for ephemeral key agreement calculator.</summary>
  20771. </member>
  20772. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsAgreement.GenerateEphemeral">
  20773. <summary>Generate an ephemeral key pair, returning the encoding of the public key.</summary>
  20774. <returns>a byte encoding of the public key.</returns>
  20775. <exception cref="T:System.IO.IOException"/>
  20776. </member>
  20777. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsAgreement.ReceivePeerValue(System.Byte[])">
  20778. <summary>Pass in the public key for the peer to the agreement calculator.</summary>
  20779. <param name="peerValue">a byte encoding of the peer public key.</param>
  20780. <exception cref="T:System.IO.IOException"/>
  20781. </member>
  20782. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsAgreement.CalculateSecret">
  20783. <summary>Calculate the agreed secret based on the calculator's current state.</summary>
  20784. <returns>the calculated secret.</returns>
  20785. <exception cref="T:System.IO.IOException"/>
  20786. </member>
  20787. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate">
  20788. <summary>Interface providing the functional representation of a single X.509 certificate.</summary>
  20789. </member>
  20790. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate.CreateEncryptor(System.Int32)">
  20791. <summary>Return an encryptor based on the public key in this certificate.</summary>
  20792. <param name="tlsCertificateRole"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificateRole"/></param>
  20793. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsEncryptor"/> based on this certificate's public key.</returns>
  20794. <exception cref="T:System.IO.IOException"/>
  20795. </member>
  20796. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate.CreateVerifier(System.Int16)">
  20797. <param name="signatureAlgorithm"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAlgorithm"/></param>
  20798. <exception cref="T:System.IO.IOException"/>
  20799. </member>
  20800. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate.CreateVerifier(System.Int32)">
  20801. <param name="signatureScheme"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureScheme"/></param>
  20802. <exception cref="T:System.IO.IOException"/>
  20803. </member>
  20804. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate.GetEncoded">
  20805. <exception cref="T:System.IO.IOException"/>
  20806. </member>
  20807. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate.GetExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  20808. <exception cref="T:System.IO.IOException"/>
  20809. </member>
  20810. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate.SigAlgOid">
  20811. <returns>the OID of this certificate's 'signatureAlgorithm', as a string.</returns>
  20812. </member>
  20813. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate.GetSigAlgParams">
  20814. <exception cref="T:System.IO.IOException"/>
  20815. </member>
  20816. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate.GetLegacySignatureAlgorithm">
  20817. <returns><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAlgorithm"/></returns>
  20818. <exception cref="T:System.IO.IOException"/>
  20819. </member>
  20820. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate.SupportsSignatureAlgorithm(System.Int16)">
  20821. <param name="signatureAlgorithm"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAlgorithm"/></param>
  20822. <returns>true if (and only if) this certificate can be used to verify the given signature algorithm.
  20823. </returns>
  20824. <exception cref="T:System.IO.IOException"/>
  20825. </member>
  20826. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate.SupportsSignatureAlgorithmCA(System.Int16)">
  20827. <exception cref="T:System.IO.IOException"/>
  20828. </member>
  20829. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate.CheckUsageInRole(System.Int32)">
  20830. <param name="tlsCertificateRole"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificateRole"/></param>
  20831. <exception cref="T:System.IO.IOException"/>
  20832. </member>
  20833. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCipher">
  20834. <summary>Base interface for a TLS bulk cipher.</summary>
  20835. </member>
  20836. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCipher.GetCiphertextDecodeLimit(System.Int32)">
  20837. <summary>Return the maximum input size for a ciphertext given a maximum output size for the plaintext of
  20838. plaintextLimit bytes.</summary>
  20839. <param name="plaintextLimit">the maximum output size for the plaintext.</param>
  20840. <returns>the maximum input size of the ciphertext for plaintextlimit bytes of output.</returns>
  20841. </member>
  20842. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCipher.GetCiphertextEncodeLimit(System.Int32,System.Int32)">
  20843. <summary>Return the maximum output size for a ciphertext given an actual input plaintext size of
  20844. plaintextLength bytes and a maximum input plaintext size of plaintextLimit bytes.</summary>
  20845. <param name="plaintextLength">the actual input size for the plaintext.</param>
  20846. <param name="plaintextLimit">the maximum input size for the plaintext.</param>
  20847. <returns>the maximum output size of the ciphertext for plaintextlimit bytes of input.</returns>
  20848. </member>
  20849. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCipher.GetPlaintextLimit(System.Int32)">
  20850. <summary>Return the maximum size for the plaintext given ciphertextlimit bytes of ciphertext.</summary>
  20851. <param name="ciphertextLimit">the maximum number of bytes of ciphertext.</param>
  20852. <returns>the maximum size of the plaintext for ciphertextlimit bytes of input.</returns>
  20853. </member>
  20854. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCipher.EncodePlaintext(System.Int64,System.Int16,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion,System.Int32,System.Byte[],System.Int32,System.Int32)">
  20855. <summary>Encode the passed in plaintext using the current bulk cipher.</summary>
  20856. <param name="seqNo">sequence number of the message represented by plaintext.</param>
  20857. <param name="contentType">content type of the message represented by plaintext.</param>
  20858. <param name="recordVersion"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion"/> used for the record.</param>
  20859. <param name="headerAllocation">extra bytes to allocate at start of returned byte array.</param>
  20860. <param name="plaintext">array holding input plaintext to the cipher.</param>
  20861. <param name="offset">offset into input array the plaintext starts at.</param>
  20862. <param name="len">length of the plaintext in the array.</param>
  20863. <returns>A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsEncodeResult"/> containing the result of encoding (after 'headerAllocation' unused
  20864. bytes).</returns>
  20865. <exception cref="T:System.IO.IOException"/>
  20866. </member>
  20867. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCipher.DecodeCiphertext(System.Int64,System.Int16,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion,System.Byte[],System.Int32,System.Int32)">
  20868. <summary>Decode the passed in ciphertext using the current bulk cipher.</summary>
  20869. <param name="seqNo">sequence number of the message represented by ciphertext.</param>
  20870. <param name="recordType">content type used in the record for this message.</param>
  20871. <param name="recordVersion"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion"/> used for the record.</param>
  20872. <param name="ciphertext">array holding input ciphertext to the cipher.</param>
  20873. <param name="offset">offset into input array the ciphertext starts at.</param>
  20874. <param name="len">length of the ciphertext in the array.</param>
  20875. <returns>A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsDecodeResult"/> containing the result of decoding.</returns>
  20876. <exception cref="T:System.IO.IOException"/>
  20877. </member>
  20878. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCipher.RekeyDecoder">
  20879. <exception cref="T:System.IO.IOException"/>
  20880. </member>
  20881. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCipher.RekeyEncoder">
  20882. <exception cref="T:System.IO.IOException"/>
  20883. </member>
  20884. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto">
  20885. <summary>Service and object creation interface for the primitive types and services that are associated with
  20886. cryptography in the API.</summary>
  20887. </member>
  20888. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasAnyStreamVerifiers(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm})">
  20889. <summary>Return true if this TlsCrypto would use a stream verifier for any of the passed in algorithms.
  20890. </summary>
  20891. <remarks>This method is only relevant to handshakes negotiating (D)TLS 1.2.</remarks>
  20892. <param name="signatureAndHashAlgorithms">A <see cref="T:System.Collections.Generic.IList`1">list</see> of
  20893. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/> values.</param>
  20894. <returns>true if this instance would use a stream verifier for any of the passed in algorithms, otherwise
  20895. false.</returns>
  20896. </member>
  20897. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasAnyStreamVerifiersLegacy(System.Int16[])">
  20898. <summary>Return true if this TlsCrypto would use a stream verifier for any of the passed in algorithms.
  20899. </summary>
  20900. <remarks>This method is only relevant to handshakes negotiating (D)TLS versions older than 1.2.</remarks>
  20901. <param name="clientCertificateTypes">An array of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientCertificateType"/> values.</param>
  20902. <returns>true if this instance would use a stream verifier for any of the passed in algorithms, otherwise
  20903. false.</returns>
  20904. </member>
  20905. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasCryptoHashAlgorithm(System.Int32)">
  20906. <summary>Return true if this TlsCrypto can support the passed in hash algorithm.</summary>
  20907. <param name="cryptoHashAlgorithm">the algorithm of interest.</param>
  20908. <returns>true if cryptoHashAlgorithm is supported, false otherwise.</returns>
  20909. </member>
  20910. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasCryptoSignatureAlgorithm(System.Int32)">
  20911. <summary>Return true if this TlsCrypto can support the passed in signature algorithm (not necessarily in
  20912. combination with EVERY hash algorithm).</summary>
  20913. <param name="cryptoSignatureAlgorithm">the algorithm of interest.</param>
  20914. <returns>true if cryptoSignatureAlgorithm is supported, false otherwise.</returns>
  20915. </member>
  20916. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasDHAgreement">
  20917. <summary>Return true if this TlsCrypto can support DH key agreement.</summary>
  20918. <returns>true if this instance can support DH key agreement, false otherwise.</returns>
  20919. </member>
  20920. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasECDHAgreement">
  20921. <summary>Return true if this TlsCrypto can support ECDH key agreement.</summary>
  20922. <returns>true if this instance can support ECDH key agreement, false otherwise.</returns>
  20923. </member>
  20924. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasEncryptionAlgorithm(System.Int32)">
  20925. <summary>Return true if this TlsCrypto can support the passed in block/stream encryption algorithm.
  20926. </summary>
  20927. <param name="encryptionAlgorithm">the algorithm of interest.</param>
  20928. <returns>true if encryptionAlgorithm is supported, false otherwise.</returns>
  20929. </member>
  20930. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasHkdfAlgorithm(System.Int32)">
  20931. <summary>Return true if this TlsCrypto can support HKDF with the passed in hash algorithm.</summary>
  20932. <param name="cryptoHashAlgorithm">the algorithm of interest.</param>
  20933. <returns>true if HKDF is supported with cryptoHashAlgorithm, false otherwise.</returns>
  20934. </member>
  20935. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasMacAlgorithm(System.Int32)">
  20936. <summary>Return true if this TlsCrypto can support the passed in MAC algorithm.</summary>
  20937. <param name="macAlgorithm">the algorithm of interest.</param>
  20938. <returns>true if macAlgorithm is supported, false otherwise.</returns>
  20939. </member>
  20940. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasNamedGroup(System.Int32)">
  20941. <summary>Return true if this TlsCrypto supports the passed in <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NamedGroup">named group</see>
  20942. value.</summary>
  20943. <returns>true if this instance supports the passed in <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NamedGroup">named group</see> value.
  20944. </returns>
  20945. </member>
  20946. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasRsaEncryption">
  20947. <summary>Return true if this TlsCrypto can support RSA encryption/decryption.</summary>
  20948. <returns>true if this instance can support RSA encryption/decryption, false otherwise.</returns>
  20949. </member>
  20950. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasSignatureAlgorithm(System.Int16)">
  20951. <summary>Return true if this TlsCrypto can support the passed in signature algorithm (not necessarily in
  20952. combination with EVERY hash algorithm).</summary>
  20953. <returns>true if signatureAlgorithm is supported, false otherwise.</returns>
  20954. </member>
  20955. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasSignatureAndHashAlgorithm(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm)">
  20956. <summary>Return true if this TlsCrypto can support the passed in signature algorithm.</summary>
  20957. <param name="sigAndHashAlgorithm">the algorithm of interest.</param>
  20958. <returns>true if sigAndHashAlgorithm is supported, false otherwise.</returns>
  20959. </member>
  20960. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasSignatureScheme(System.Int32)">
  20961. <summary>Return true if this TlsCrypto can support the passed in signature scheme.</summary>
  20962. <param name="signatureScheme">the scheme of interest.</param>
  20963. <returns>true if signatureScheme is supported, false otherwise.</returns>
  20964. </member>
  20965. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasSrpAuthentication">
  20966. <summary>Return true if this TlsCrypto can support SRP authentication.</summary>
  20967. <returns>true if this instance can support SRP authentication, false otherwise.</returns>
  20968. </member>
  20969. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateSecret(System.Byte[])">
  20970. <summary>Create a TlsSecret object based on provided data.</summary>
  20971. <param name="data">the data to base the TlsSecret on.</param>
  20972. <returns>a TlsSecret based on the provided data.</returns>
  20973. </member>
  20974. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.GenerateRsaPreMasterSecret(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion)">
  20975. <summary>Create a TlsSecret object containing a randomly-generated RSA PreMasterSecret</summary>
  20976. <param name="clientVersion">the client version to place in the first 2 bytes</param>
  20977. <returns>a TlsSecret containing the PreMasterSecret.</returns>
  20978. </member>
  20979. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.SecureRandom">
  20980. <summary>Return the primary (safest) SecureRandom for this crypto.</summary>
  20981. <returns>a SecureRandom suitable for key generation.</returns>
  20982. </member>
  20983. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateCertificate(System.Byte[])">
  20984. <summary>Create a TlsCertificate from an ASN.1 binary encoding of an X.509 certificate.</summary>
  20985. <param name="encoding">DER/BER encoding of the certificate of interest.</param>
  20986. <returns>a TlsCertificate.</returns>
  20987. <exception cref="T:System.IO.IOException">if there is an issue on decoding or constructing the certificate.</exception>
  20988. </member>
  20989. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateCertificate(System.Int16,System.Byte[])">
  20990. <summary>Create a TlsCertificate from an ASN.1 binary encoding of a certificate.</summary>
  20991. <param name="type">Certificate type as per IANA TLS Certificate Types registry.</param>
  20992. <param name="encoding">DER/BER encoding of the certificate of interest.</param>
  20993. <returns>a TlsCertificate.</returns>
  20994. <exception cref="T:System.IO.IOException">if there is an issue on decoding or constructing the certificate.</exception>
  20995. </member>
  20996. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateCipher(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,System.Int32,System.Int32)">
  20997. <summary>Create a cipher for the specified encryption and MAC algorithms.</summary>
  20998. <remarks>
  20999. See enumeration classes <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.EncryptionAlgorithm"/>, <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.MacAlgorithm"/> for appropriate
  21000. argument values.
  21001. </remarks>
  21002. <param name="cryptoParams">context specific parameters.</param>
  21003. <param name="encryptionAlgorithm">the encryption algorithm to be employed by the cipher.</param>
  21004. <param name="macAlgorithm">the MAC algorithm to be employed by the cipher.</param>
  21005. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCipher"/> implementing the encryption and MAC algorithms.</returns>
  21006. <exception cref="T:System.IO.IOException"/>
  21007. </member>
  21008. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateDHDomain(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsDHConfig)">
  21009. <summary>Create a domain object supporting the domain parameters described in dhConfig.</summary>
  21010. <param name="dhConfig">the config describing the DH parameters to use.</param>
  21011. <returns>a TlsDHDomain supporting the parameters in dhConfig.</returns>
  21012. </member>
  21013. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateECDomain(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsECConfig)">
  21014. <summary>Create a domain object supporting the domain parameters described in ecConfig.</summary>
  21015. <param name="ecConfig">the config describing the EC parameters to use.</param>
  21016. <returns>a TlsECDomain supporting the parameters in ecConfig.</returns>
  21017. </member>
  21018. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.AdoptSecret(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret)">
  21019. <summary>Adopt the passed in secret, creating a new copy of it.</summary>
  21020. <param name="secret">the secret to make a copy of.</param>
  21021. <returns>a TlsSecret based on the original secret.</returns>
  21022. </member>
  21023. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateHash(System.Int32)">
  21024. <summary>Create a suitable hash for the hash algorithm identifier passed in.</summary>
  21025. <remarks>
  21026. See enumeration class <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for appropriate argument values.
  21027. </remarks>
  21028. <param name="cryptoHashAlgorithm">the hash algorithm the hash needs to implement.</param>
  21029. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHash"/>.</returns>
  21030. </member>
  21031. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateHmac(System.Int32)">
  21032. <summary>Create a suitable HMAC for the MAC algorithm identifier passed in.</summary>
  21033. <remarks>
  21034. See enumeration class <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.MacAlgorithm"/> for appropriate argument values.
  21035. </remarks>
  21036. <param name="macAlgorithm">the MAC algorithm the HMAC needs to match.</param>
  21037. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHmac"/>.</returns>
  21038. </member>
  21039. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateHmacForHash(System.Int32)">
  21040. <summary>Create a suitable HMAC using the hash algorithm identifier passed in.</summary>
  21041. <remarks>
  21042. See enumeration class <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for appropriate argument values.
  21043. </remarks>
  21044. <param name="cryptoHashAlgorithm">the hash algorithm the HMAC should use.</param>
  21045. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHmac"/>.</returns>
  21046. </member>
  21047. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateNonceGenerator(System.Byte[])">
  21048. <summary>Create a nonce generator.</summary>
  21049. <remarks>
  21050. Each call should construct a new generator, and the generator should be returned from this call only after
  21051. automatically seeding from this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto"/>'s entropy source, and from the provided additional
  21052. seed material. The output of each returned generator must be completely independent of the others.
  21053. </remarks>
  21054. <param name="additionalSeedMaterial">context-specific seed material</param>
  21055. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsNonceGenerator"/>.</returns>
  21056. </member>
  21057. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateSrp6Client(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrpConfig)">
  21058. <summary>Create an SRP-6 client.</summary>
  21059. <param name="srpConfig">client config.</param>
  21060. <returns>an initialised SRP6 client object.</returns>
  21061. </member>
  21062. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateSrp6Server(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrpConfig,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  21063. <summary>Create an SRP-6 server.</summary>
  21064. <param name="srpConfig">server config.</param>
  21065. <param name="srpVerifier">the SRP6 verifier value.</param>
  21066. <returns>an initialised SRP6 server object.</returns>
  21067. </member>
  21068. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateSrp6VerifierGenerator(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrpConfig)">
  21069. <summary>Create an SRP-6 verifier generator.</summary>
  21070. <param name="srpConfig">generator config.</param>
  21071. <returns>an initialized SRP6 verifier generator.</returns>
  21072. </member>
  21073. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto.HkdfInit(System.Int32)">
  21074. <summary>Setup an initial "secret" for a chain of HKDF calls (RFC 5869), containing a string of HashLen
  21075. zeroes.</summary>
  21076. <param name="cryptoHashAlgorithm">the hash algorithm to instantiate HMAC with. See
  21077. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for values.</param>
  21078. </member>
  21079. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoException">
  21080. <summary>Basic exception class for crypto services to pass back a cause.</summary>
  21081. </member>
  21082. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters">
  21083. <summary>Carrier class for context-related parameters needed for creating secrets and ciphers.</summary>
  21084. </member>
  21085. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext)">
  21086. <summary>Base constructor.</summary>
  21087. <param name="context">the context for this parameters object.</param>
  21088. </member>
  21089. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoUtilities.HkdfExpandLabel(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret,System.Int32,System.String,System.Byte[],System.Int32)">
  21090. <exception cref="T:System.IO.IOException"/>
  21091. </member>
  21092. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoUtilities.HkdfExpandLabel(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret,System.Int32,System.ReadOnlySpan{System.Char},System.ReadOnlySpan{System.Byte},System.Int32)">
  21093. <exception cref="T:System.IO.IOException"/>
  21094. </member>
  21095. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsDHConfig">
  21096. <summary>Basic config for Diffie-Hellman.</summary>
  21097. </member>
  21098. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsDHDomain">
  21099. <summary>Domain interface to service factory for creating Diffie-Hellman operators.</summary>
  21100. </member>
  21101. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsDHDomain.CreateDH">
  21102. <summary>Return an agreement operator suitable for ephemeral Diffie-Hellman.</summary>
  21103. <returns>a key agreement operator.</returns>
  21104. </member>
  21105. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsECConfig">
  21106. <summary>Carrier class for Elliptic Curve parameter configuration.</summary>
  21107. </member>
  21108. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsECConfig.NamedGroup">
  21109. <summary>Return the group used.</summary>
  21110. <returns>the <see cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsECConfig.NamedGroup">named group</see> used.</returns>
  21111. </member>
  21112. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsECDomain">
  21113. <summary>Domain interface to service factory for creating Elliptic-Curve (EC) based operators.</summary>
  21114. </member>
  21115. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsECDomain.CreateECDH">
  21116. <summary>Return an agreement operator suitable for ephemeral EC Diffie-Hellman.</summary>
  21117. <returns>a key agreement operator.</returns>
  21118. </member>
  21119. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsEncryptor">
  21120. <summary>Base interface for an encryptor.</summary>
  21121. </member>
  21122. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsEncryptor.Encrypt(System.Byte[],System.Int32,System.Int32)">
  21123. <summary>Encrypt data from the passed in input array.</summary>
  21124. <param name="input">byte array containing the input data.</param>
  21125. <param name="inOff">offset into input where the data starts.</param>
  21126. <param name="length">the length of the data to encrypt.</param>
  21127. <returns>the encrypted data.</returns>
  21128. <exception cref="T:System.IO.IOException"/>
  21129. </member>
  21130. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHash">
  21131. <summary>Interface for message digest, or hash, services.</summary>
  21132. </member>
  21133. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHash.Update(System.Byte[],System.Int32,System.Int32)">
  21134. <summary>Update the hash with the passed in input.</summary>
  21135. <param name="input">input array containing the data.</param>
  21136. <param name="inOff">offset into the input array the input starts at.</param>
  21137. <param name="length">the length of the input data.</param>
  21138. </member>
  21139. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHash.CalculateHash">
  21140. <summary>Return calculated hash for any input passed in.</summary>
  21141. <returns>the hash value.</returns>
  21142. </member>
  21143. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHash.CloneHash">
  21144. <summary>Return a clone of this hash object representing its current state.</summary>
  21145. <returns>a clone of the current hash.</returns>
  21146. </member>
  21147. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHash.Reset">
  21148. <summary>Reset the hash underlying this service.</summary>
  21149. </member>
  21150. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHmac">
  21151. <summary>Interface for MAC services based on HMAC.</summary>
  21152. </member>
  21153. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHmac.InternalBlockSize">
  21154. <summary>Return the internal block size for the message digest underlying this HMAC service.</summary>
  21155. <returns>the internal block size for the digest (in bytes).</returns>
  21156. </member>
  21157. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsMac">
  21158. <summary>Interface for MAC services.</summary>
  21159. </member>
  21160. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsMac.SetKey(System.Byte[],System.Int32,System.Int32)">
  21161. <summary>Set the key to be used by the MAC implementation supporting this service.</summary>
  21162. <param name="key">array holding the MAC key.</param>
  21163. <param name="keyOff">offset into the array the key starts at.</param>
  21164. <param name="keyLen">length of the key in the array.</param>
  21165. </member>
  21166. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsMac.Update(System.Byte[],System.Int32,System.Int32)">
  21167. <summary>Update the MAC with the passed in input.</summary>
  21168. <param name="input">input array containing the data.</param>
  21169. <param name="inOff">offset into the input array the input starts at.</param>
  21170. <param name="length">the length of the input data.</param>
  21171. </member>
  21172. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsMac.CalculateMac">
  21173. <summary>Return calculated MAC for any input passed in.</summary>
  21174. <returns>the MAC value.</returns>
  21175. </member>
  21176. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsMac.CalculateMac(System.Byte[],System.Int32)">
  21177. <summary>Write the calculated MAC to an output buffer.</summary>
  21178. <param name="output">output array to write the MAC to.</param>
  21179. <param name="outOff">offset into the output array to write the MAC to.</param>
  21180. </member>
  21181. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsMac.MacLength">
  21182. <summary>Return the length of the MAC generated by this service.</summary>
  21183. <returns>the MAC length.</returns>
  21184. </member>
  21185. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsMac.Reset">
  21186. <summary>Reset the MAC underlying this service.</summary>
  21187. </member>
  21188. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsNonceGenerator.GenerateNonce(System.Int32)">
  21189. <summary>Generate a nonce byte[] string.</summary>
  21190. <param name="size">the length, in bytes, of the nonce to generate.</param>
  21191. <returns>the nonce value.</returns>
  21192. </member>
  21193. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsNullNullCipher">
  21194. <summary>The cipher for TLS_NULL_WITH_NULL_NULL.</summary>
  21195. </member>
  21196. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret">
  21197. <summary>Interface supporting the generation of key material and other SSL/TLS secret values from PRFs.
  21198. </summary>
  21199. </member>
  21200. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret.CalculateHmac(System.Int32,System.Byte[],System.Int32,System.Int32)">
  21201. <summary>Calculate an HMAC with this secret's data as the key.</summary>
  21202. <param name="cryptoHashAlgorithm">the hash algorithm to instantiate HMAC with. See
  21203. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for values.</param>
  21204. <param name="buf">array containing the input data.</param>
  21205. <param name="off">offset into the input array the input starts at.</param>
  21206. <param name="len">the length of the input data.</param>
  21207. </member>
  21208. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret.DeriveUsingPrf(System.Int32,System.String,System.Byte[],System.Int32)">
  21209. <summary>Return a new secret based on applying a PRF to this one.</summary>
  21210. <param name="prfAlgorithm">PRF algorithm to use.</param>
  21211. <param name="label">the label details.</param>
  21212. <param name="seed">the seed details.</param>
  21213. <param name="length">the size (in bytes) of the secret to generate.</param>
  21214. <returns>the new secret.</returns>
  21215. </member>
  21216. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret.Destroy">
  21217. <summary>Destroy the internal state of the secret.</summary>
  21218. <remarks>
  21219. After this call, any attempt to use the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret"/> will result in an
  21220. <see cref="T:System.InvalidOperationException"/> being thrown.
  21221. </remarks>
  21222. </member>
  21223. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret.Encrypt(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsEncryptor)">
  21224. <summary>Return an encrypted copy of the data this secret is based on.</summary>
  21225. <param name="encryptor">the encryptor to use for protecting the internal data.</param>
  21226. <returns>an encrypted copy of this secret's internal data.</returns>
  21227. <exception cref="T:System.IO.IOException"/>
  21228. </member>
  21229. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret.Extract">
  21230. <summary>Return the internal data from this secret.</summary>
  21231. <remarks>
  21232. The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret"/> does not keep a copy of the data. After this call, any attempt to use the
  21233. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret"/> will result in an <see cref="T:System.InvalidOperationException"/> being thrown.
  21234. </remarks>
  21235. <returns>the secret's internal data.</returns>
  21236. </member>
  21237. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret.HkdfExpand(System.Int32,System.Byte[],System.Int32)">
  21238. <summary>RFC 5869 HKDF-Expand function, with this secret's data as the pseudo-random key ('prk').</summary>
  21239. <param name="cryptoHashAlgorithm">the hash algorithm to instantiate HMAC with. See
  21240. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for values.</param>
  21241. <param name="info">optional context and application specific information (can be zero-length).</param>
  21242. <param name="length">length of output keying material in octets.</param>
  21243. <returns> output keying material (of 'length' octets).</returns>
  21244. </member>
  21245. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret.HkdfExtract(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret)">
  21246. <summary>RFC 5869 HKDF-Extract function, with this secret's data as the 'salt'.</summary>
  21247. <remarks>
  21248. The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret"/> does not keep a copy of the data. After this call, any attempt to use
  21249. the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSecret"/> will result in an <see cref="T:System.InvalidOperationException"/> being thrown.
  21250. </remarks>
  21251. <param name="cryptoHashAlgorithm">the hash algorithm to instantiate HMAC with. See
  21252. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for values.</param>
  21253. <param name="ikm">input keying material.</param>
  21254. <returns>a pseudo-random key (of HashLen octets).</returns>
  21255. </member>
  21256. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSigner">
  21257. <summary>Base interface for a TLS signer that works on raw message digests.</summary>
  21258. </member>
  21259. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSigner.GenerateRawSignature(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm,System.Byte[])">
  21260. <summary>Generate an encoded signature based on the passed in hash.</summary>
  21261. <param name="algorithm">the signature algorithm to use.</param>
  21262. <param name="hash">the hash calculated for the signature.</param>
  21263. <returns>an encoded signature.</returns>
  21264. <exception cref="T:System.IO.IOException">in case of an exception processing the hash.</exception>
  21265. </member>
  21266. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSigner.GetStreamSigner(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm)">
  21267. <exception cref="T:System.IO.IOException"/>
  21268. </member>
  21269. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrp6Client">
  21270. <summary>Basic interface for an SRP-6 client implementation.</summary>
  21271. </member>
  21272. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrp6Client.CalculateSecret(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  21273. <summary>Generates the secret S given the server's credentials</summary>
  21274. <param name="serverB">The server's credentials</param>
  21275. <returns>Client's verification message for the server</returns>
  21276. <exception cref="T:System.IO.IOException">If server's credentials are invalid</exception>
  21277. </member>
  21278. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrp6Client.GenerateClientCredentials(System.Byte[],System.Byte[],System.Byte[])">
  21279. <summary>Generates client's credentials given the client's salt, identity and password</summary>
  21280. <param name="salt">The salt used in the client's verifier.</param>
  21281. <param name="identity">The user's identity (eg. username)</param>
  21282. <param name="password">The user's password</param>
  21283. <returns>Client's public value to send to server</returns>
  21284. </member>
  21285. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrp6Server">
  21286. <summary>Basic interface for an SRP-6 server implementation.</summary>
  21287. </member>
  21288. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrp6Server.GenerateServerCredentials">
  21289. <summary>Generates the server's credentials that are to be sent to the client.</summary>
  21290. <returns>The server's public value to the client</returns>
  21291. </member>
  21292. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrp6Server.CalculateSecret(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  21293. <summary>Processes the client's credentials. If valid the shared secret is generated and returned.
  21294. </summary>
  21295. <param name="clientA">The client's credentials.</param>
  21296. <returns>A shared secret <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger"/>.</returns>
  21297. <exception cref="T:System.IO.IOException">If client's credentials are invalid.</exception>
  21298. </member>
  21299. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrp6VerifierGenerator">
  21300. <summary>Base interface for a generator for SRP-6 verifiers.</summary>
  21301. </member>
  21302. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrp6VerifierGenerator.GenerateVerifier(System.Byte[],System.Byte[],System.Byte[])">
  21303. <summary>Creates a new SRP-6 verifier value.</summary>
  21304. <param name="salt">The salt to use, generally should be large and random</param>
  21305. <param name="identity">The user's identifying information (eg. username)</param>
  21306. <param name="password">The user's password</param>
  21307. <returns>A new verifier for use in future SRP authentication</returns>
  21308. </member>
  21309. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrpConfig">
  21310. <summary>Basic config for SRP.</summary>
  21311. </member>
  21312. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrpConfig.GetExplicitNG">
  21313. <summary>Return the (N, g) values used in SRP-6.</summary>
  21314. <returns>(N, g) as a BigInteger array (N=[0], g=[1]).</returns>
  21315. </member>
  21316. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrpConfig.SetExplicitNG(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger[])">
  21317. <summary>Set the (N, g) values used for SRP-6.</summary>
  21318. <param name="explicitNG">(N, g) as a BigInteger array (N=[0], g=[1]).</param>
  21319. </member>
  21320. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsStreamSigner.Stream">
  21321. <exception cref="T:System.IO.IOException"/>
  21322. </member>
  21323. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsStreamSigner.GetSignature">
  21324. <exception cref="T:System.IO.IOException"/>
  21325. </member>
  21326. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsStreamVerifier.Stream">
  21327. <exception cref="T:System.IO.IOException"/>
  21328. </member>
  21329. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsStreamVerifier.IsVerified">
  21330. <exception cref="T:System.IO.IOException"/>
  21331. </member>
  21332. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsVerifier">
  21333. <summary>Base interface for a TLS verifier that works with signatures and either raw message digests, or entire
  21334. messages.</summary>
  21335. </member>
  21336. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsVerifier.GetStreamVerifier(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigitallySigned)">
  21337. <exception cref="T:System.IO.IOException"/>
  21338. </member>
  21339. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsVerifier.VerifyRawSignature(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigitallySigned,System.Byte[])">
  21340. <summary>Return true if the passed in signature and hash represent a real signature.</summary>
  21341. <param name="digitallySigned">the signature object containing the signature to be verified.</param>
  21342. <param name="hash">the hash calculated for the signature.</param>
  21343. <returns>true if signature verifies, false otherwise.</returns>
  21344. <exception cref="T:System.IO.IOException">in case of an exception verifying signature.</exception>
  21345. </member>
  21346. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramReceiver.GetReceiveLimit">
  21347. <exception cref="T:System.IO.IOException"/>
  21348. </member>
  21349. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramReceiver.Receive(System.Byte[],System.Int32,System.Int32,System.Int32)">
  21350. <exception cref="T:System.IO.IOException"/>
  21351. </member>
  21352. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramReceiver.Receive(System.Span{System.Byte},System.Int32)">
  21353. <exception cref="T:System.IO.IOException"/>
  21354. </member>
  21355. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramSender.GetSendLimit">
  21356. <exception cref="T:System.IO.IOException"/>
  21357. </member>
  21358. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramSender.Send(System.Byte[],System.Int32,System.Int32)">
  21359. <exception cref="T:System.IO.IOException"/>
  21360. </member>
  21361. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramSender.Send(System.ReadOnlySpan{System.Byte})">
  21362. <exception cref="T:System.IO.IOException"/>
  21363. </member>
  21364. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramTransport">
  21365. <summary>Base interface for an object sending and receiving DTLS data.</summary>
  21366. </member>
  21367. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsCredentialedSigner">
  21368. <summary>Container class for generating signatures that carries the signature type, parameters, public key
  21369. certificate and public key's associated signer object.</summary>
  21370. </member>
  21371. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsDHGroupVerifier.#ctor">
  21372. <summary>Accept named groups and various standard DH groups with 'P' at least
  21373. <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsDHGroupVerifier.DefaultMinimumPrimeBits"/> bits.</summary>
  21374. </member>
  21375. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsDHGroupVerifier.#ctor(System.Int32)">
  21376. <summary>Accept named groups and various standard DH groups with 'P' at least the specified number of bits.
  21377. </summary>
  21378. <param name="minimumPrimeBits">the minimum bitlength of 'P'.</param>
  21379. </member>
  21380. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsDHGroupVerifier.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.DHGroup},System.Int32)">
  21381. <summary>Accept named groups and a custom set of group parameters, subject to a minimum bitlength for 'P'.
  21382. </summary>
  21383. <param name="groups">a <see cref="T:System.Collections.Generic.IList`1">list</see> of acceptable <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.DHGroup"/>s.</param>
  21384. <param name="minimumPrimeBits">the minimum bitlength of 'P'.</param>
  21385. </member>
  21386. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsServer.GetDsaSignerCredentials">
  21387. <exception cref="T:System.IO.IOException"/>
  21388. </member>
  21389. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsServer.GetECDsaSignerCredentials">
  21390. <exception cref="T:System.IO.IOException"/>
  21391. </member>
  21392. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsServer.GetRsaEncryptionCredentials">
  21393. <exception cref="T:System.IO.IOException"/>
  21394. </member>
  21395. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsServer.GetRsaSignerCredentials">
  21396. <exception cref="T:System.IO.IOException"/>
  21397. </member>
  21398. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsSrpConfigVerifier.#ctor">
  21399. <summary>Accept only the group parameters specified in RFC 5054 Appendix A.</summary>
  21400. </member>
  21401. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsSrpConfigVerifier.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Srp6Group})">
  21402. <summary>Specify a custom set of acceptable group parameters.</summary>
  21403. <param name="groups">an <see cref="T:System.Collections.Generic.IList`1"/> of acceptable <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Srp6Group"/>.</param>
  21404. </member>
  21405. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DeferredHash">
  21406. <summary>Buffers input until the hash algorithm is determined.</summary>
  21407. </member>
  21408. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DeferredHash.CopyBufferTo(System.IO.Stream)">
  21409. <exception cref="T:System.IO.IOException"/>
  21410. </member>
  21411. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigestInputBuffer.CopyInputTo(System.IO.Stream)">
  21412. <exception cref="T:System.IO.IOException"/>
  21413. </member>
  21414. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigitallySigned.Algorithm">
  21415. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/> (or null before TLS 1.2).</returns>
  21416. </member>
  21417. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigitallySigned.Encode(System.IO.Stream)">
  21418. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigitallySigned"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  21419. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  21420. <exception cref="T:System.IO.IOException"/>
  21421. </member>
  21422. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigitallySigned.Parse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  21423. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigitallySigned"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  21424. <param name="context">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  21425. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  21426. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigitallySigned"/> object.</returns>
  21427. <exception cref="T:System.IO.IOException"/>
  21428. </member>
  21429. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.Connect(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramTransport)">
  21430. <exception cref="T:System.IO.IOException"/>
  21431. </member>
  21432. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshake(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer)">
  21433. <exception cref="T:System.IO.IOException"/>
  21434. </member>
  21435. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.GenerateCertificateVerify(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigitallySigned)">
  21436. <exception cref="T:System.IO.IOException"/>
  21437. </member>
  21438. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.GenerateClientHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState)">
  21439. <exception cref="T:System.IO.IOException"/>
  21440. </member>
  21441. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.GenerateClientKeyExchange(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState)">
  21442. <exception cref="T:System.IO.IOException"/>
  21443. </member>
  21444. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessCertificateRequest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  21445. <exception cref="T:System.IO.IOException"/>
  21446. </member>
  21447. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessCertificateStatus(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  21448. <exception cref="T:System.IO.IOException"/>
  21449. </member>
  21450. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessHelloVerifyRequest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  21451. <exception cref="T:System.IO.IOException"/>
  21452. </member>
  21453. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessNewSessionTicket(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  21454. <exception cref="T:System.IO.IOException"/>
  21455. </member>
  21456. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessServerCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  21457. <exception cref="T:System.IO.IOException"/>
  21458. </member>
  21459. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessServerHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  21460. <exception cref="T:System.IO.IOException"/>
  21461. </member>
  21462. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessServerKeyExchange(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  21463. <exception cref="T:System.IO.IOException"/>
  21464. </member>
  21465. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessServerSupplementalData(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  21466. <exception cref="T:System.IO.IOException"/>
  21467. </member>
  21468. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ReportServerVersion(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion)">
  21469. <exception cref="T:System.IO.IOException"/>
  21470. </member>
  21471. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsClientProtocol.PatchClientHelloWithCookie(System.Byte[],System.Byte[])">
  21472. <exception cref="T:System.IO.IOException"/>
  21473. </member>
  21474. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsEpoch.AllocateSequenceNumber">
  21475. <exception cref="T:System.IO.IOException"/>
  21476. </member>
  21477. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsHandshakeRetransmit.ReceivedHandshakeRecord(System.Int32,System.Byte[],System.Int32,System.Int32)">
  21478. <exception cref="T:System.IO.IOException"/>
  21479. </member>
  21480. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsProtocol.ProcessFinished(System.Byte[],System.Byte[])">
  21481. <exception cref="T:System.IO.IOException"/>
  21482. </member>
  21483. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsProtocol.ApplyMaxFragmentLengthExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer,System.Int16)">
  21484. <exception cref="T:System.IO.IOException"/>
  21485. </member>
  21486. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsProtocol.EvaluateMaxFragmentLengthExtension(System.Boolean,System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int16)">
  21487. <exception cref="T:System.IO.IOException"/>
  21488. </member>
  21489. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsProtocol.GenerateCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate,System.IO.Stream)">
  21490. <exception cref="T:System.IO.IOException"/>
  21491. </member>
  21492. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsProtocol.GenerateSupplementalData(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SupplementalDataEntry})">
  21493. <exception cref="T:System.IO.IOException"/>
  21494. </member>
  21495. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsProtocol.SendCertificateMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate,System.IO.Stream)">
  21496. <exception cref="T:System.IO.IOException"/>
  21497. </member>
  21498. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsProtocol.ValidateSelectedCipherSuite(System.Int32,System.Int16)">
  21499. <exception cref="T:System.IO.IOException"/>
  21500. </member>
  21501. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.ReceiveClientHelloRecord(System.Byte[],System.Int32,System.Int32)">
  21502. <exception cref="T:System.IO.IOException"/>
  21503. </member>
  21504. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.SendHelloVerifyRequestRecord(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramSender,System.Int64,System.Byte[])">
  21505. <exception cref="T:System.IO.IOException"/>
  21506. </member>
  21507. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.SendDatagram(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramSender,System.Byte[],System.Int32,System.Int32)">
  21508. <exception cref="T:System.IO.IOException"/>
  21509. </member>
  21510. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.GetReceiveLimit">
  21511. <exception cref="T:System.IO.IOException"/>
  21512. </member>
  21513. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.GetSendLimit">
  21514. <exception cref="T:System.IO.IOException"/>
  21515. </member>
  21516. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.Receive(System.Byte[],System.Int32,System.Int32,System.Int32)">
  21517. <exception cref="T:System.IO.IOException"/>
  21518. </member>
  21519. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.Receive(System.Span{System.Byte},System.Int32)">
  21520. <exception cref="T:System.IO.IOException"/>
  21521. </member>
  21522. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.Send(System.Byte[],System.Int32,System.Int32)">
  21523. <exception cref="T:System.IO.IOException"/>
  21524. </member>
  21525. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.Send(System.ReadOnlySpan{System.Byte})">
  21526. <exception cref="T:System.IO.IOException"/>
  21527. </member>
  21528. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.Close">
  21529. <exception cref="T:System.IO.IOException"/>
  21530. </member>
  21531. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.Warn(System.Int16,System.String)">
  21532. <exception cref="T:System.IO.IOException"/>
  21533. </member>
  21534. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.RaiseAlert(System.Int16,System.Int16,System.String,System.Exception)">
  21535. <exception cref="T:System.IO.IOException"/>
  21536. </member>
  21537. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.ReceiveDatagram(System.Byte[],System.Int32,System.Int32,System.Int32)">
  21538. <exception cref="T:System.IO.IOException"/>
  21539. </member>
  21540. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.ProcessRecord(System.Int32,System.Byte[],System.Span{System.Byte})">
  21541. <exception cref="T:System.IO.IOException"/>
  21542. </member>
  21543. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.ReceiveRecord(System.Byte[],System.Int32,System.Int32,System.Int32)">
  21544. <exception cref="T:System.IO.IOException"/>
  21545. </member>
  21546. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.SendHeartbeatMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatMessage)">
  21547. <exception cref="T:System.IO.IOException"/>
  21548. </member>
  21549. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer.SendRecord(System.Int16,System.ReadOnlySpan{System.Byte})">
  21550. <exception cref="T:System.IO.IOException"/>
  21551. </member>
  21552. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.ReadClientRequest(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  21553. <exception cref="T:System.IO.IOException"/>
  21554. </member>
  21555. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.SendHelloVerifyRequest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramSender,System.Int64,System.Byte[])">
  21556. <exception cref="T:System.IO.IOException"/>
  21557. </member>
  21558. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.SendMessage(System.Int16,System.Byte[])">
  21559. <exception cref="T:System.IO.IOException"/>
  21560. </member>
  21561. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.ReceiveMessage">
  21562. <exception cref="T:System.IO.IOException"/>
  21563. </member>
  21564. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.ReceiveMessageBody(System.Int16)">
  21565. <exception cref="T:System.IO.IOException"/>
  21566. </member>
  21567. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.ReceiveMessageDelayedDigest(System.Int16)">
  21568. <exception cref="T:System.IO.IOException"/>
  21569. </member>
  21570. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.UpdateHandshakeMessagesDigest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.Message)">
  21571. <exception cref="T:System.IO.IOException"/>
  21572. </member>
  21573. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.CheckInboundFlight">
  21574. Check that there are no "extra" messages left in the current inbound flight
  21575. </member>
  21576. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.GetPendingMessage">
  21577. <exception cref="T:System.IO.IOException"/>
  21578. </member>
  21579. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.ImplReceiveMessage">
  21580. <exception cref="T:System.IO.IOException"/>
  21581. </member>
  21582. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.ProcessRecord(System.Int32,System.Int32,System.Byte[],System.Int32,System.Int32)">
  21583. <exception cref="T:System.IO.IOException"/>
  21584. </member>
  21585. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.ResendOutboundFlight">
  21586. <exception cref="T:System.IO.IOException"/>
  21587. </member>
  21588. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.WriteMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.Message)">
  21589. <exception cref="T:System.IO.IOException"/>
  21590. </member>
  21591. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.WriteHandshakeFragment(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReliableHandshake.Message,System.Int32,System.Int32)">
  21592. <exception cref="T:System.IO.IOException"/>
  21593. </member>
  21594. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReplayWindow">
  21595. RFC 4347 4.1.2.5 Anti-replay
  21596. <p>
  21597. Support fast rejection of duplicate records by maintaining a sliding receive window
  21598. </p>
  21599. </member>
  21600. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReplayWindow.ShouldDiscard(System.Int64)">
  21601. <summary>Check whether a received record with the given sequence number should be rejected as a duplicate.
  21602. </summary>
  21603. <param name="seq">the 48-bit DTLSPlainText.sequence_number field of a received record.</param>
  21604. <returns>true if the record should be discarded without further processing.</returns>
  21605. </member>
  21606. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsReplayWindow.ReportAuthenticated(System.Int64)">
  21607. <summary>Report that a received record with the given sequence number passed authentication checks.
  21608. </summary>
  21609. <param name="seq">the 48-bit DTLSPlainText.sequence_number field of an authenticated record.</param>
  21610. </member>
  21611. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.Accept(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramTransport)">
  21612. <exception cref="T:System.IO.IOException"/>
  21613. </member>
  21614. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.Accept(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DatagramTransport,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRequest)">
  21615. <exception cref="T:System.IO.IOException"/>
  21616. </member>
  21617. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshake(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRequest)">
  21618. <exception cref="T:System.IO.IOException"/>
  21619. </member>
  21620. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.GenerateCertificateRequest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest)">
  21621. <exception cref="T:System.IO.IOException"/>
  21622. </member>
  21623. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.GenerateCertificateStatus(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus)">
  21624. <exception cref="T:System.IO.IOException"/>
  21625. </member>
  21626. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.GenerateNewSessionTicket(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NewSessionTicket)">
  21627. <exception cref="T:System.IO.IOException"/>
  21628. </member>
  21629. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.GenerateServerHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsRecordLayer)">
  21630. <exception cref="T:System.IO.IOException"/>
  21631. </member>
  21632. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.NotifyClientCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate)">
  21633. <exception cref="T:System.IO.IOException"/>
  21634. </member>
  21635. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessClientCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,System.Byte[])">
  21636. <exception cref="T:System.IO.IOException"/>
  21637. </member>
  21638. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessCertificateVerify(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsHandshakeHash)">
  21639. <exception cref="T:System.IO.IOException"/>
  21640. </member>
  21641. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessClientHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,System.Byte[])">
  21642. <exception cref="T:System.IO.IOException"/>
  21643. </member>
  21644. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessClientHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientHello)">
  21645. <exception cref="T:System.IO.IOException"/>
  21646. </member>
  21647. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessClientKeyExchange(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,System.Byte[])">
  21648. <exception cref="T:System.IO.IOException"/>
  21649. </member>
  21650. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessClientSupplementalData(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,System.Byte[])">
  21651. <exception cref="T:System.IO.IOException"/>
  21652. </member>
  21653. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsTransport.GetReceiveLimit">
  21654. <exception cref="T:System.IO.IOException"/>
  21655. </member>
  21656. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsTransport.GetSendLimit">
  21657. <exception cref="T:System.IO.IOException"/>
  21658. </member>
  21659. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsTransport.Receive(System.Byte[],System.Int32,System.Int32,System.Int32)">
  21660. <exception cref="T:System.IO.IOException"/>
  21661. </member>
  21662. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsTransport.Receive(System.Span{System.Byte},System.Int32)">
  21663. <exception cref="T:System.IO.IOException"/>
  21664. </member>
  21665. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsTransport.Send(System.Byte[],System.Int32,System.Int32)">
  21666. <exception cref="T:System.IO.IOException"/>
  21667. </member>
  21668. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DtlsTransport.Close">
  21669. <exception cref="T:System.IO.IOException"/>
  21670. </member>
  21671. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ECCurveType">
  21672. <summary>RFC 4492 5.4</summary>
  21673. </member>
  21674. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ECCurveType.explicit_prime">
  21675. Indicates the elliptic curve domain parameters are conveyed verbosely, and the
  21676. underlying finite field is a prime field.
  21677. </member>
  21678. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ECCurveType.explicit_char2">
  21679. Indicates the elliptic curve domain parameters are conveyed verbosely, and the
  21680. underlying finite field is a characteristic-2 field.
  21681. </member>
  21682. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ECCurveType.named_curve">
  21683. Indicates that a named curve is used. This option SHOULD be used when applicable.
  21684. </member>
  21685. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ECPointFormat">
  21686. <summary>RFC 4492 5.1.2</summary>
  21687. </member>
  21688. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.EncryptionAlgorithm">
  21689. <summary>RFC 2246</summary>
  21690. <remarks>
  21691. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  21692. particular values (e.g. serialization).
  21693. </remarks>
  21694. </member>
  21695. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ExporterLabel">
  21696. <summary>RFC 5705</summary>
  21697. </member>
  21698. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HandshakeMessageOutput.Send(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol,System.Int16,System.Byte[])">
  21699. <exception cref="T:System.IO.IOException"/>
  21700. </member>
  21701. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HandshakeMessageOutput.#ctor(System.Int16)">
  21702. <exception cref="T:System.IO.IOException"/>
  21703. </member>
  21704. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HandshakeMessageOutput.#ctor(System.Int16,System.Int32)">
  21705. <exception cref="T:System.IO.IOException"/>
  21706. </member>
  21707. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HandshakeMessageOutput.Send(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol)">
  21708. <exception cref="T:System.IO.IOException"/>
  21709. </member>
  21710. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HashAlgorithm">
  21711. <summary>RFC 5246 7.4.1.4.1</summary>
  21712. </member>
  21713. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatExtension.Encode(System.IO.Stream)">
  21714. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatExtension"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  21715. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  21716. <exception cref="T:System.IO.IOException"/>
  21717. </member>
  21718. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatExtension.Parse(System.IO.Stream)">
  21719. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatExtension"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  21720. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  21721. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatExtension"/> object.</returns>
  21722. <exception cref="T:System.IO.IOException"/>
  21723. </member>
  21724. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatMessage.Encode(System.IO.Stream)">
  21725. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatMessage"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  21726. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  21727. <exception cref="T:System.IO.IOException"/>
  21728. </member>
  21729. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatMessage.Parse(System.IO.Stream)">
  21730. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatMessage"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  21731. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  21732. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatMessage"/> object.</returns>
  21733. <exception cref="T:System.IO.IOException"/>
  21734. </member>
  21735. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatMessageType">
  21736. <summary>RFC 6520 3.</summary>
  21737. </member>
  21738. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.IdentifierType">
  21739. <summary>RFC 6066</summary>
  21740. </member>
  21741. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyExchangeAlgorithm">
  21742. <summary>RFC 2246</summary>
  21743. <remarks>
  21744. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  21745. particular values (e.g. serialization).
  21746. </remarks>
  21747. </member>
  21748. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry.#ctor(System.Int32,System.Byte[])">
  21749. <param name="namedGroup"><see cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry.NamedGroup"/></param>
  21750. <param name="keyExchange"></param>
  21751. </member>
  21752. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry.NamedGroup">
  21753. <returns><see cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry.NamedGroup"/></returns>
  21754. </member>
  21755. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry.Encode(System.IO.Stream)">
  21756. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  21757. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  21758. <exception cref="T:System.IO.IOException"/>
  21759. </member>
  21760. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry.Parse(System.IO.Stream)">
  21761. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  21762. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  21763. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry"/> object.</returns>
  21764. <exception cref="T:System.IO.IOException"/>
  21765. </member>
  21766. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyUpdateRequest">
  21767. <summary>RFC 8446 4.6.3</summary>
  21768. </member>
  21769. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.MacAlgorithm">
  21770. <summary>RFC 2246</summary>
  21771. <remarks>
  21772. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  21773. particular values (e.g. serialization).
  21774. </remarks>
  21775. </member>
  21776. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NamedGroup">
  21777. <summary>RFC 7919</summary>
  21778. </member>
  21779. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NamedGroupRole">
  21780. <remarks>
  21781. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  21782. particular values (e.g. serialization).
  21783. </remarks>
  21784. </member>
  21785. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NewSessionTicket.Encode(System.IO.Stream)">
  21786. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NewSessionTicket"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  21787. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  21788. <exception cref="T:System.IO.IOException"/>
  21789. </member>
  21790. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NewSessionTicket.Parse(System.IO.Stream)">
  21791. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NewSessionTicket"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  21792. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  21793. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NewSessionTicket"/> object.</returns>
  21794. <exception cref="T:System.IO.IOException"/>
  21795. </member>
  21796. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OcspStatusRequest">
  21797. <summary>RFC 3546 3.6</summary>
  21798. </member>
  21799. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OcspStatusRequest.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.ResponderID},Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions)">
  21800. <param name="responderIDList">an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.ResponderID"/>, specifying the list of
  21801. trusted OCSP responders. An empty list has the special meaning that the responders are implicitly known to
  21802. the server - e.g., by prior arrangement.</param>
  21803. <param name="requestExtensions">OCSP request extensions. A null value means that there are no extensions.
  21804. </param>
  21805. </member>
  21806. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OcspStatusRequest.ResponderIDList">
  21807. <returns>an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.ResponderID"/>.</returns>
  21808. </member>
  21809. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OcspStatusRequest.RequestExtensions">
  21810. <returns>OCSP request extensions.</returns>
  21811. </member>
  21812. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OcspStatusRequest.Encode(System.IO.Stream)">
  21813. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OcspStatusRequest"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  21814. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  21815. <exception cref="T:System.IO.IOException"/>
  21816. </member>
  21817. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OcspStatusRequest.Parse(System.IO.Stream)">
  21818. <summary>Parse an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OcspStatusRequest"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  21819. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  21820. <returns>an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OcspStatusRequest"/> object.</returns>
  21821. <exception cref="T:System.IO.IOException"/>
  21822. </member>
  21823. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OfferedPsks.Encode(System.IO.Stream)">
  21824. <exception cref="T:System.IO.IOException"/>
  21825. </member>
  21826. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OfferedPsks.EncodeBinders(System.IO.Stream,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsHandshakeHash,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OfferedPsks.BindersConfig)">
  21827. <exception cref="T:System.IO.IOException"/>
  21828. </member>
  21829. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OfferedPsks.GetBindersSize(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPsk[])">
  21830. <exception cref="T:System.IO.IOException"/>
  21831. </member>
  21832. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OfferedPsks.Parse(System.IO.Stream)">
  21833. <exception cref="T:System.IO.IOException"/>
  21834. </member>
  21835. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.PrfAlgorithm">
  21836. <summary>RFC 5246</summary>
  21837. <remarks>
  21838. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  21839. particular values (e.g. serialization).
  21840. </remarks>
  21841. </member>
  21842. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName">
  21843. <summary>RFC 7301 Represents a protocol name for use with ALPN.</summary>
  21844. </member>
  21845. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName.Encode(System.IO.Stream)">
  21846. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  21847. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  21848. <exception cref="T:System.IO.IOException"/>
  21849. </member>
  21850. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName.Parse(System.IO.Stream)">
  21851. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  21852. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  21853. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName"/> object.</returns>
  21854. <exception cref="T:System.IO.IOException"/>
  21855. </member>
  21856. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.PskTlsClient.GetAuthentication">
  21857. <exception cref="T:System.IO.IOException"/>
  21858. </member>
  21859. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.PskTlsServer.GetRsaEncryptionCredentials">
  21860. <exception cref="T:System.IO.IOException"/>
  21861. </member>
  21862. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream">
  21863. <summary>An implementation of the TLS 1.0/1.1/1.2 record layer.</summary>
  21864. </member>
  21865. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.NotifyChangeCipherSpecReceived">
  21866. <exception cref="T:System.IO.IOException"/>
  21867. </member>
  21868. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.EnablePendingCipherRead(System.Boolean)">
  21869. <exception cref="T:System.IO.IOException"/>
  21870. </member>
  21871. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.EnablePendingCipherWrite">
  21872. <exception cref="T:System.IO.IOException"/>
  21873. </member>
  21874. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.FinaliseHandshake">
  21875. <exception cref="T:System.IO.IOException"/>
  21876. </member>
  21877. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.NotifyKeyUpdateReceived">
  21878. <exception cref="T:System.IO.IOException"/>
  21879. </member>
  21880. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.NotifyKeyUpdateSent">
  21881. <exception cref="T:System.IO.IOException"/>
  21882. </member>
  21883. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.PreviewRecordHeader(System.Byte[])">
  21884. <exception cref="T:System.IO.IOException"/>
  21885. </member>
  21886. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.ReadFullRecord(System.Byte[],System.Int32,System.Int32)">
  21887. <exception cref="T:System.IO.IOException"/>
  21888. </member>
  21889. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.ReadRecord">
  21890. <exception cref="T:System.IO.IOException"/>
  21891. </member>
  21892. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.DecodeAndVerify(System.Int16,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion,System.Byte[],System.Int32,System.Int32)">
  21893. <exception cref="T:System.IO.IOException"/>
  21894. </member>
  21895. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.WriteRecord(System.Int16,System.Byte[],System.Int32,System.Int32)">
  21896. <exception cref="T:System.IO.IOException"/>
  21897. </member>
  21898. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.WriteRecord(System.Int16,System.ReadOnlySpan{System.Byte})">
  21899. <exception cref="T:System.IO.IOException"/>
  21900. </member>
  21901. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.Close">
  21902. <exception cref="T:System.IO.IOException"/>
  21903. </member>
  21904. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.CheckChangeCipherSpec(System.Byte[],System.Int32,System.Int32)">
  21905. <exception cref="T:System.IO.IOException"/>
  21906. </member>
  21907. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.CheckRecordType(System.Byte[],System.Int32)">
  21908. <exception cref="T:System.IO.IOException"/>
  21909. </member>
  21910. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.CheckLength(System.Int32,System.Int32,System.Int16)">
  21911. <exception cref="T:System.IO.IOException"/>
  21912. </member>
  21913. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.Record.FillTo(System.IO.Stream,System.Int32)">
  21914. <exception cref="T:System.IO.IOException"/>
  21915. </member>
  21916. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.Record.ReadFragment(System.IO.Stream,System.Int32)">
  21917. <exception cref="T:System.IO.IOException"/>
  21918. </member>
  21919. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.Record.ReadHeader(System.IO.Stream)">
  21920. <exception cref="T:System.IO.IOException"/>
  21921. </member>
  21922. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.RecordStream.SequenceNumber.NextValue(System.Int16)">
  21923. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsFatalAlert"/>
  21924. </member>
  21925. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerHello.Encode(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  21926. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerHello"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  21927. <param name="context">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  21928. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  21929. <exception cref="T:System.IO.IOException"/>
  21930. </member>
  21931. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerHello.Parse(System.IO.MemoryStream)">
  21932. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerHello"/> from a <see cref="T:System.IO.MemoryStream"/>.</summary>
  21933. <param name="input">the <see cref="T:System.IO.MemoryStream"/> to parse from.</param>
  21934. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerHello"/> object.</returns>
  21935. <exception cref="T:System.IO.IOException"/>
  21936. </member>
  21937. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName">
  21938. <summary>RFC 6066 3. Server Name Indication</summary>
  21939. <remarks>
  21940. Current implementation uses this guidance: "For backward compatibility, all future data structures associated
  21941. with new NameTypes MUST begin with a 16-bit length field. TLS MAY treat provided server names as opaque data
  21942. and pass the names and types to the application.". RFC 6066 specifies ASCII encoding for host_name (possibly
  21943. using A-labels for IDNs), but note that the previous version (RFC 4366) specified UTF-8 encoding (see RFC 6066
  21944. Appendix A). For maximum compatibility, it is recommended that client code tolerate receiving UTF-8 from the
  21945. peer, but only generate ASCII itself.
  21946. </remarks>
  21947. </member>
  21948. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName.Encode(System.IO.Stream)">
  21949. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  21950. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  21951. <exception cref="T:System.IO.IOException"/>
  21952. </member>
  21953. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName.Parse(System.IO.Stream)">
  21954. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  21955. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  21956. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName"/> object.</returns>
  21957. <exception cref="T:System.IO.IOException"/>
  21958. </member>
  21959. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerNameList.#ctor(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName})">
  21960. <param name="serverNameList">an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName"/>.</param>
  21961. </member>
  21962. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerNameList.ServerNames">
  21963. <returns>an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName"/>.</returns>
  21964. </member>
  21965. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerNameList.Encode(System.IO.Stream)">
  21966. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerNameList"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  21967. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to .</param>
  21968. <exception cref="T:System.IO.IOException"/>
  21969. </member>
  21970. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerNameList.Parse(System.IO.Stream)">
  21971. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerNameList"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  21972. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  21973. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerNameList"/> object.</returns>
  21974. <exception cref="T:System.IO.IOException"/>
  21975. </member>
  21976. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerSrpParams.Encode(System.IO.Stream)">
  21977. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerSrpParams"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  21978. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  21979. <exception cref="T:System.IO.IOException"/>
  21980. </member>
  21981. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerSrpParams.Parse(System.IO.Stream)">
  21982. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerSrpParams"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  21983. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  21984. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerSrpParams"/> object.</returns>
  21985. <exception cref="T:System.IO.IOException"/>
  21986. </member>
  21987. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SessionParameters.Builder.SetServerExtensions(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  21988. <exception cref="T:System.IO.IOException"/>
  21989. </member>
  21990. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SessionParameters.ReadServerExtensions">
  21991. <exception cref="T:System.IO.IOException"/>
  21992. </member>
  21993. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAlgorithm">
  21994. RFC 5246 7.4.1.4.1 (in RFC 2246, there were no specific values assigned)
  21995. </member>
  21996. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm">
  21997. <summary>RFC 5246 7.4.1.4.1</summary>
  21998. </member>
  21999. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm.#ctor(System.Int16,System.Int16)">
  22000. <param name="hash"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HashAlgorithm"/></param>
  22001. <param name="signature"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAlgorithm"/></param>
  22002. </member>
  22003. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm.Hash">
  22004. <returns><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HashAlgorithm"/></returns>
  22005. </member>
  22006. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm.Signature">
  22007. <returns><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAlgorithm"/></returns>
  22008. </member>
  22009. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm.Encode(System.IO.Stream)">
  22010. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  22011. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  22012. <exception cref="T:System.IO.IOException"/>
  22013. </member>
  22014. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm.Parse(System.IO.Stream)">
  22015. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  22016. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  22017. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/> object.</returns>
  22018. <exception cref="T:System.IO.IOException"/>
  22019. </member>
  22020. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureScheme.GetNamedGroup(System.Int32)">
  22021. For TLS 1.3+ usage, some signature schemes are constrained to use a particular
  22022. ({@link NamedGroup}. Not relevant for TLS 1.2 and below.
  22023. </member>
  22024. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SimulatedTlsSrpIdentityManager">
  22025. <summary>An implementation of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpIdentityManager"/> that simulates the existence of "unknown"
  22026. identities to obscure the fact that there is no verifier for them.</summary>
  22027. </member>
  22028. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SimulatedTlsSrpIdentityManager.GetRfc5054Default(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Srp6Group,System.Byte[])">
  22029. <summary>Create a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SimulatedTlsSrpIdentityManager"/> that implements the algorithm from RFC 5054
  22030. 2.5.1.3.</summary>
  22031. <param name="crypto"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCrypto"/></param>
  22032. <param name="group">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Srp6Group"/> defining the group that SRP is operating in.</param>
  22033. <param name="seedKey">the secret "seed key" referred to in RFC 5054 2.5.1.3.</param>
  22034. <returns>an instance of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SimulatedTlsSrpIdentityManager"/>.</returns>
  22035. <exception cref="T:System.IO.IOException"/>
  22036. </member>
  22037. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SrpTlsClient.GetClientExtensions">
  22038. <exception cref="T:System.IO.IOException"/>
  22039. </member>
  22040. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SrpTlsClient.ProcessServerExtensions(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22041. <exception cref="T:System.IO.IOException"/>
  22042. </member>
  22043. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SrpTlsClient.GetAuthentication">
  22044. <exception cref="T:System.IO.IOException"/>
  22045. </member>
  22046. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SrpTlsServer.GetDsaSignerCredentials">
  22047. <exception cref="T:System.IO.IOException"/>
  22048. </member>
  22049. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SrpTlsServer.GetRsaSignerCredentials">
  22050. <exception cref="T:System.IO.IOException"/>
  22051. </member>
  22052. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Ssl3Utilities.ReadEncryptedPms(System.IO.Stream)">
  22053. <exception cref="T:System.IO.IOException"/>
  22054. </member>
  22055. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Ssl3Utilities.WriteEncryptedPms(System.Byte[],System.IO.Stream)">
  22056. <exception cref="T:System.IO.IOException"/>
  22057. </member>
  22058. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SupplementalDataType">
  22059. <summary>RFC 4680</summary>
  22060. </member>
  22061. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsAuthentication">
  22062. <summary>Base interface to provide TLS authentication credentials.</summary>
  22063. </member>
  22064. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsAuthentication.NotifyServerCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerCertificate)">
  22065. <summary>Called by the protocol handler to report the server certificate.</summary>
  22066. <remarks>
  22067. Note: this method is responsible for certificate verification and validation.
  22068. </remarks>
  22069. <param name="serverCertificate">the server certificate received.</param>
  22070. <exception cref="T:System.IO.IOException"/>
  22071. </member>
  22072. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsAuthentication.GetClientCredentials(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest)">
  22073. <summary>Return client credentials in response to server's certificate request.</summary>
  22074. <remarks>
  22075. The returned value may be null, or else it MUST implement <em>exactly one</em> of
  22076. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedAgreement"/>, <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedDecryptor"/>, or
  22077. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedSigner"/>, depending on the key exchange that was negotiated and the details of
  22078. the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest"/>.
  22079. </remarks>
  22080. <param name="certificateRequest">details of the certificate request.</param>
  22081. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentials"/> object or null for no client authentication.</returns>
  22082. <exception cref="T:System.IO.IOException"/>
  22083. </member>
  22084. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.GetSessionToResume">
  22085. <summary>Return the session this client wants to resume, if any.</summary>
  22086. <remarks>
  22087. Note that the peer's certificate chain for the session (if any) may need to be periodically revalidated.
  22088. </remarks>
  22089. <returns>A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSession"/> representing the resumable session to be used for this connection, or
  22090. null to use a new session.</returns>
  22091. <seealso cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SessionParameters.PeerCertificate"/>
  22092. </member>
  22093. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.GetExternalPsks">
  22094. <summary>Return the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPskExternal">external PSKs</see> to offer in the ClientHello.</summary>
  22095. <remarks>This will only be called when TLS 1.3 or higher is amongst the offered protocol versions.</remarks>
  22096. <returns>an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPskExternal"/> instances, or null if none should be
  22097. offered.</returns>
  22098. </member>
  22099. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.GetClientExtensions">
  22100. <returns>(Int32 -> byte[])</returns>
  22101. <exception cref="T:System.IO.IOException"/>
  22102. </member>
  22103. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.GetEarlyKeyShareGroups">
  22104. <summary>If this client is offering TLS 1.3 or higher, this method may be called to determine for which
  22105. groups a key share should be included in the initial ClientHello.</summary>
  22106. <remarks>
  22107. Groups that were not included in the supported_groups extension (by <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.GetClientExtensions"/> will
  22108. be ignored. The protocol will then add a suitable key_share extension to the ClientHello extensions.
  22109. </remarks>
  22110. <returns>an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NamedGroup">named group</see> values, possibly empty or
  22111. null.
  22112. </returns>
  22113. </member>
  22114. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.NotifyServerVersion(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion)">
  22115. <exception cref="T:System.IO.IOException"/>
  22116. </member>
  22117. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.NotifySessionToResume(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSession)">
  22118. <summary>Notifies the client of the session that will be offered in ClientHello for resumption, if any.
  22119. </summary>
  22120. <remarks>
  22121. This will be either the session returned from {@link #getSessionToResume()} or null if that session was
  22122. unusable. NOTE: the actual negotiated session_id is notified by <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.NotifySessionID(System.Byte[])"/>.
  22123. </remarks>
  22124. <param name="session">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSession"/> representing the resumable session to be offered for
  22125. this connection, or null if there is none.</param>
  22126. <seealso cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.NotifySessionID(System.Byte[])"/>
  22127. </member>
  22128. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.NotifySessionID(System.Byte[])">
  22129. <summary>Notifies the client of the session_id sent in the ServerHello.</summary>
  22130. <param name="sessionID"/>
  22131. <seealso cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext.Session"/>
  22132. </member>
  22133. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.NotifySelectedPsk(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPsk)">
  22134. <exception cref="T:System.IO.IOException"/>
  22135. </member>
  22136. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.ProcessServerExtensions(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22137. <summary>The protocol implementation validates that any server extensions received correspond to client
  22138. extensions sent.</summary>
  22139. <remarks>
  22140. If further processing of the server extensions is needed, it can be done in this callback. NOTE: This is
  22141. not called for session resumption handshakes.
  22142. </remarks>
  22143. <param name="serverExtensions">(Int32 -> byte[])</param>
  22144. <exception cref="T:System.IO.IOException"/>
  22145. </member>
  22146. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.ProcessServerSupplementalData(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SupplementalDataEntry})">
  22147. <param name="serverSupplementalData">(SupplementalDataEntry)</param>
  22148. <exception cref="T:System.IO.IOException"/>
  22149. </member>
  22150. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.GetPskIdentity">
  22151. <exception cref="T:System.IO.IOException"/>
  22152. </member>
  22153. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.GetSrpIdentity">
  22154. <exception cref="T:System.IO.IOException"/>
  22155. </member>
  22156. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.GetDHGroupVerifier">
  22157. <exception cref="T:System.IO.IOException"/>
  22158. </member>
  22159. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.GetSrpConfigVerifier">
  22160. <exception cref="T:System.IO.IOException"/>
  22161. </member>
  22162. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.GetAuthentication">
  22163. <exception cref="T:System.IO.IOException"/>
  22164. </member>
  22165. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.GetClientSupplementalData">
  22166. <returns>(SupplementalDataEntry)</returns>
  22167. <exception cref="T:System.IO.IOException"/>
  22168. </member>
  22169. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient.NotifyNewSessionTicket(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NewSessionTicket)">
  22170. <summary>RFC 5077 3.3. NewSessionTicket Handshake Message</summary>
  22171. <remarks>
  22172. This method will be called (only) when a NewSessionTicket handshake message is received. The ticket is
  22173. opaque to the client and clients MUST NOT examine the ticket under the assumption that it complies with e.g.
  22174. RFC 5077 4. "Recommended Ticket Construction".
  22175. </remarks>
  22176. <param name="newSessionTicket">The ticket.</param>
  22177. <exception cref="T:System.IO.IOException"/>
  22178. </member>
  22179. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientContext">
  22180. <summary>Marker interface to distinguish a TLS client context.</summary>
  22181. </member>
  22182. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.#ctor">
  22183. <summary>Constructor for non-blocking mode.</summary>
  22184. <remarks>
  22185. When data is received, use <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.OfferInput(System.Byte[])"/> to provide the received ciphertext,
  22186. then use <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadInput(System.Byte[],System.Int32,System.Int32)"/> to read the corresponding cleartext.<br/><br/>
  22187. Similarly, when data needs to be sent, use <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteApplicationData(System.Byte[],System.Int32,System.Int32)"/>
  22188. to provide the cleartext, then use <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadOutput(System.Byte[],System.Int32,System.Int32)"/> to get the
  22189. corresponding ciphertext.
  22190. </remarks>
  22191. </member>
  22192. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.#ctor(System.IO.Stream)">
  22193. <summary>Constructor for blocking mode.</summary>
  22194. <param name="stream">The <see cref="T:System.IO.Stream"/> of data to/from the server.</param>
  22195. </member>
  22196. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.#ctor(System.IO.Stream,System.IO.Stream)">
  22197. <summary>Constructor for blocking mode.</summary>
  22198. <param name="input">The <see cref="T:System.IO.Stream"/> of data from the server.</param>
  22199. <param name="output">The <see cref="T:System.IO.Stream"/> of data to the server.</param>
  22200. </member>
  22201. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Connect(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient)">
  22202. <summary>Initiates a TLS handshake in the role of client.</summary>
  22203. <remarks>
  22204. In blocking mode, this will not return until the handshake is complete. In non-blocking mode, use
  22205. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeComplete"/> to receive a callback when the handshake is complete.
  22206. </remarks>
  22207. <param name="tlsClient">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient"/> to use for the handshake.</param>
  22208. <exception cref="T:System.IO.IOException">If in blocking mode and handshake was not successful.</exception>
  22209. </member>
  22210. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Handle13HandshakeMessage(System.Int16,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HandshakeMessageInput)">
  22211. <exception cref="T:System.IO.IOException"/>
  22212. </member>
  22213. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.HandleServerCertificate">
  22214. <exception cref="T:System.IO.IOException"/>
  22215. </member>
  22216. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.HandleSupplementalData(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SupplementalDataEntry})">
  22217. <exception cref="T:System.IO.IOException"/>
  22218. </member>
  22219. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Process13HelloRetryRequest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerHello)">
  22220. <exception cref="T:System.IO.IOException"/>
  22221. </member>
  22222. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Process13ServerHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerHello,System.Boolean)">
  22223. <exception cref="T:System.IO.IOException"/>
  22224. </member>
  22225. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Process13ServerHelloCoda(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerHello,System.Boolean)">
  22226. <exception cref="T:System.IO.IOException"/>
  22227. </member>
  22228. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.ProcessServerHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerHello)">
  22229. <exception cref="T:System.IO.IOException"/>
  22230. </member>
  22231. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Receive13CertificateRequest(System.IO.MemoryStream,System.Boolean)">
  22232. <exception cref="T:System.IO.IOException"/>
  22233. </member>
  22234. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Receive13EncryptedExtensions(System.IO.MemoryStream)">
  22235. <exception cref="T:System.IO.IOException"/>
  22236. </member>
  22237. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Receive13NewSessionTicket(System.IO.MemoryStream)">
  22238. <exception cref="T:System.IO.IOException"/>
  22239. </member>
  22240. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Receive13ServerCertificate(System.IO.MemoryStream)">
  22241. <exception cref="T:System.IO.IOException"/>
  22242. </member>
  22243. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Receive13ServerCertificateVerify(System.IO.MemoryStream)">
  22244. <exception cref="T:System.IO.IOException"/>
  22245. </member>
  22246. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Receive13ServerFinished(System.IO.MemoryStream)">
  22247. <exception cref="T:System.IO.IOException"/>
  22248. </member>
  22249. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.ReceiveCertificateRequest(System.IO.MemoryStream)">
  22250. <exception cref="T:System.IO.IOException"/>
  22251. </member>
  22252. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.ReceiveNewSessionTicket(System.IO.MemoryStream)">
  22253. <exception cref="T:System.IO.IOException"/>
  22254. </member>
  22255. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.ReceiveServerHelloMessage(System.IO.MemoryStream)">
  22256. <exception cref="T:System.IO.IOException"/>
  22257. </member>
  22258. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Send13ClientHelloRetry">
  22259. <exception cref="T:System.IO.IOException"/>
  22260. </member>
  22261. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.SendCertificateVerifyMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigitallySigned)">
  22262. <exception cref="T:System.IO.IOException"/>
  22263. </member>
  22264. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.SendClientHello">
  22265. <exception cref="T:System.IO.IOException"/>
  22266. </member>
  22267. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.SendClientHelloMessage">
  22268. <exception cref="T:System.IO.IOException"/>
  22269. </member>
  22270. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.SendClientKeyExchange">
  22271. <exception cref="T:System.IO.IOException"/>
  22272. </member>
  22273. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Skip13CertificateRequest">
  22274. <exception cref="T:System.IO.IOException"/>
  22275. </member>
  22276. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientProtocol.Skip13ServerCertificate">
  22277. <exception cref="T:System.IO.IOException"/>
  22278. </member>
  22279. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCloseable.Close">
  22280. <exception cref="T:System.IO.IOException"/>
  22281. </member>
  22282. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext">
  22283. <summary>Base interface for a TLS context implementation.</summary>
  22284. </member>
  22285. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext.IsServer">
  22286. <summary>Return true if this context is for a server, false otherwise.</summary>
  22287. <returns>true for a server based context, false for a client based one.</returns>
  22288. </member>
  22289. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext.ResumableSession">
  22290. <summary>Used to get the resumable session, if any, used by this connection.</summary>
  22291. <remarks>
  22292. Only available after the handshake has successfully completed.
  22293. </remarks>
  22294. <returns>A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSession"/> representing the resumable session used by this connection, or null if
  22295. no resumable session available.</returns>
  22296. <seealso cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeComplete"/>
  22297. </member>
  22298. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext.Session">
  22299. <summary>Used to get the session information for this connection.</summary>
  22300. <remarks>
  22301. Only available after the handshake has successfully completed. Use <see cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSession.IsResumable"/>
  22302. to find out if the session is resumable.
  22303. </remarks>
  22304. <returns>A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSession"/> representing the session used by this connection.</returns>
  22305. <seealso cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeComplete"/>
  22306. </member>
  22307. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext.ExportChannelBinding(System.Int32)">
  22308. <summary>Export the value of the specified channel binding.</summary>
  22309. <remarks>
  22310. Only available after the handshake has successfully completed.
  22311. </remarks>
  22312. <param name="channelBinding">A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ChannelBinding"/> constant specifying the channel binding to
  22313. export.</param>
  22314. <returns>A copy of the channel binding data as a <c>byte[]</c>, or null if the binding could not be
  22315. determined.</returns>
  22316. </member>
  22317. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext.ExportEarlyKeyingMaterial(System.String,System.Byte[],System.Int32)">
  22318. <summary>Export (early data) keying material according to RFC 5705: "Keying Material Exporters for TLS", as
  22319. updated for TLS 1.3 (RFC 8446).</summary>
  22320. <remarks>
  22321. NOTE: for use in settings where an exporter is needed for 0-RTT data.
  22322. </remarks>
  22323. <param name="asciiLabel">indicates which application will use the exported keys.</param>
  22324. <param name="context_value">allows the application using the exporter to mix its own data with the TLS PRF
  22325. for the exporter output.</param>
  22326. <param name="length">the number of bytes to generate.</param>
  22327. <returns>a pseudorandom bit string of 'length' bytes generated from the (exporter_)master_secret.</returns>
  22328. </member>
  22329. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext.ExportKeyingMaterial(System.String,System.Byte[],System.Int32)">
  22330. <summary>Export keying material according to RFC 5705: "Keying Material Exporters for TLS", as updated for
  22331. TLS 1.3 (RFC 8446) when negotiated.</summary>
  22332. <param name="asciiLabel">indicates which application will use the exported keys.</param>
  22333. <param name="context_value">allows the application using the exporter to mix its own data with the TLS PRF
  22334. for the exporter output.</param>
  22335. <param name="length">the number of bytes to generate.</param>
  22336. <returns>a pseudorandom bit string of 'length' bytes generated from the (exporter_)master_secret.</returns>
  22337. </member>
  22338. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedAgreement">
  22339. <summary>Support interface for generating a secret based on the credentials sent by a TLS peer.</summary>
  22340. </member>
  22341. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedAgreement.GenerateAgreement(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate)">
  22342. <summary>Calculate an agreed secret based on our credentials and the public key credentials of our peer.
  22343. </summary>
  22344. <param name="peerCertificate">public key certificate of our TLS peer.</param>
  22345. <returns>the agreed secret.</returns>
  22346. <exception cref="T:System.IO.IOException">in case of an exception on generation of the secret.</exception>
  22347. </member>
  22348. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedDecryptor">
  22349. <summary>Base interface for a class that decrypts TLS secrets.</summary>
  22350. </member>
  22351. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedDecryptor.Decrypt(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,System.Byte[])">
  22352. <summary>Decrypt the passed in cipher text using the parameters available.</summary>
  22353. <param name="cryptoParams">the parameters to use for the decryption.</param>
  22354. <param name="ciphertext">the cipher text containing the secret.</param>
  22355. <returns>a TLS secret.</returns>
  22356. <exception cref="T:System.IO.IOException">on a parsing or decryption error.</exception>
  22357. </member>
  22358. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedSigner">
  22359. <summary>Support interface for generating a signature based on our private credentials.</summary>
  22360. </member>
  22361. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedSigner.GenerateRawSignature(System.Byte[])">
  22362. <summary>Generate a signature against the passed in hash.</summary>
  22363. <param name="hash">a message digest calculated across the message the signature is to apply to.</param>
  22364. <returns>an encoded signature.</returns>
  22365. <exception cref="T:System.IO.IOException">if the hash cannot be processed, or there is an issue with the private
  22366. credentials.</exception>
  22367. </member>
  22368. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedSigner.SignatureAndHashAlgorithm">
  22369. <summary>Return the algorithm IDs for the signature algorithm and the associated hash it uses.</summary>
  22370. <returns>the full algorithm details for the signature.</returns>
  22371. </member>
  22372. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedSigner.GetStreamSigner">
  22373. <exception cref="T:System.IO.IOException"/>
  22374. </member>
  22375. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentials">
  22376. <summary>Base interface for interfaces/classes carrying TLS credentials.</summary>
  22377. </member>
  22378. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentials.Certificate">
  22379. <summary>Return the certificate structure representing our identity.</summary>
  22380. <returns>our certificate structure.</returns>
  22381. </member>
  22382. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHanonKeyExchange">
  22383. <summary>(D)TLS DH_anon key exchange.</summary>
  22384. </member>
  22385. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHGroupVerifier">
  22386. <summary>Interface for verifying explicit Diffie-Hellman group parameters.</summary>
  22387. </member>
  22388. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHGroupVerifier.Accept(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.DHGroup)">
  22389. <summary>Check whether the given DH group is acceptable for use.</summary>
  22390. <param name="dhGroup">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.DHGroup"/> to check.</param>
  22391. <returns>true if (and only if) the specified group is acceptable.</returns>
  22392. </member>
  22393. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHKeyExchange">
  22394. <summary>(D)TLS DH key exchange.</summary>
  22395. </member>
  22396. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHUtilities.ReceiveDHConfig(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHGroupVerifier,System.IO.Stream)">
  22397. <exception cref="T:System.IO.IOException"/>
  22398. </member>
  22399. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHUtilities.ReadDHParameter(System.IO.Stream)">
  22400. <exception cref="T:System.IO.IOException"/>
  22401. </member>
  22402. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHUtilities.WriteDHConfig(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsDHConfig,System.IO.Stream)">
  22403. <exception cref="T:System.IO.IOException"/>
  22404. </member>
  22405. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHUtilities.WriteDHParameter(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.IO.Stream)">
  22406. <exception cref="T:System.IO.IOException"/>
  22407. </member>
  22408. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsEccUtilities.CreateNamedECConfig(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.Int32)">
  22409. <exception cref="T:System.IO.IOException"/>
  22410. </member>
  22411. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsEccUtilities.CheckPointEncoding(System.Int32,System.Byte[])">
  22412. <exception cref="T:System.IO.IOException"/>
  22413. </member>
  22414. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsEccUtilities.ReceiveECDHConfig(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  22415. <exception cref="T:System.IO.IOException"/>
  22416. </member>
  22417. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsEccUtilities.WriteECConfig(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsECConfig,System.IO.Stream)">
  22418. <exception cref="T:System.IO.IOException"/>
  22419. </member>
  22420. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsEccUtilities.WriteNamedECParameters(System.Int32,System.IO.Stream)">
  22421. <exception cref="T:System.IO.IOException"/>
  22422. </member>
  22423. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsECDHanonKeyExchange">
  22424. <summary>(D)TLS ECDH_anon key exchange (see RFC 4492).</summary>
  22425. </member>
  22426. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsECDheKeyExchange">
  22427. <summary>(D)TLS ECDHE key exchange (see RFC 4492).</summary>
  22428. </member>
  22429. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsECDHKeyExchange">
  22430. <summary>(D)TLS ECDH key exchange (see RFC 4492).</summary>
  22431. </member>
  22432. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddAlpnExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName})">
  22433. <param name="extensions">(Int32 -> byte[])</param>
  22434. <param name="protocolNameList">an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName"/>.</param>
  22435. <exception cref="T:System.IO.IOException"/>
  22436. </member>
  22437. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddAlpnExtensionServer(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName)">
  22438. <exception cref="T:System.IO.IOException"/>
  22439. </member>
  22440. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddCertificateAuthoritiesExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name})">
  22441. <exception cref="T:System.IO.IOException"/>
  22442. </member>
  22443. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddClientCertificateTypeExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int16[])">
  22444. <exception cref="T:System.IO.IOException"/>
  22445. </member>
  22446. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddClientCertificateTypeExtensionServer(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int16)">
  22447. <exception cref="T:System.IO.IOException"/>
  22448. </member>
  22449. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddCompressCertificateExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int32[])">
  22450. <exception cref="T:System.IO.IOException"/>
  22451. </member>
  22452. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddCookieExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Byte[])">
  22453. <exception cref="T:System.IO.IOException"/>
  22454. </member>
  22455. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddEarlyDataMaxSize(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int64)">
  22456. <exception cref="T:System.IO.IOException"/>
  22457. </member>
  22458. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddHeartbeatExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatExtension)">
  22459. <exception cref="T:System.IO.IOException"/>
  22460. </member>
  22461. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddKeyShareClientHello(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry})">
  22462. <exception cref="T:System.IO.IOException"/>
  22463. </member>
  22464. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddKeyShareHelloRetryRequest(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int32)">
  22465. <exception cref="T:System.IO.IOException"/>
  22466. </member>
  22467. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddKeyShareServerHello(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry)">
  22468. <exception cref="T:System.IO.IOException"/>
  22469. </member>
  22470. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddMaxFragmentLengthExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int16)">
  22471. <exception cref="T:System.IO.IOException"/>
  22472. </member>
  22473. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddOidFiltersExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IDictionary{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Byte[]})">
  22474. <exception cref="T:System.IO.IOException"/>
  22475. </member>
  22476. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddPaddingExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int32)">
  22477. <exception cref="T:System.IO.IOException"/>
  22478. </member>
  22479. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddPreSharedKeyClientHello(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OfferedPsks)">
  22480. <exception cref="T:System.IO.IOException"/>
  22481. </member>
  22482. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddPreSharedKeyServerHello(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int32)">
  22483. <exception cref="T:System.IO.IOException"/>
  22484. </member>
  22485. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddPskKeyExchangeModesExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int16[])">
  22486. <exception cref="T:System.IO.IOException"/>
  22487. </member>
  22488. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddRecordSizeLimitExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int32)">
  22489. <exception cref="T:System.IO.IOException"/>
  22490. </member>
  22491. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddServerCertificateTypeExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int16[])">
  22492. <exception cref="T:System.IO.IOException"/>
  22493. </member>
  22494. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddServerCertificateTypeExtensionServer(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int16)">
  22495. <exception cref="T:System.IO.IOException"/>
  22496. </member>
  22497. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddServerNameExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName})">
  22498. <exception cref="T:System.IO.IOException"/>
  22499. </member>
  22500. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddServerNameExtensionServer(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22501. <exception cref="T:System.IO.IOException"/>
  22502. </member>
  22503. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSignatureAlgorithmsExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm})">
  22504. <exception cref="T:System.IO.IOException"/>
  22505. </member>
  22506. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSignatureAlgorithmsCertExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm})">
  22507. <exception cref="T:System.IO.IOException"/>
  22508. </member>
  22509. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddStatusRequestExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequest)">
  22510. <exception cref="T:System.IO.IOException"/>
  22511. </member>
  22512. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddStatusRequestV2Extension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequestItemV2})">
  22513. <exception cref="T:System.IO.IOException"/>
  22514. </member>
  22515. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSupportedGroupsExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IList{System.Int32})">
  22516. <exception cref="T:System.IO.IOException"/>
  22517. </member>
  22518. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSupportedPointFormatsExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int16[])">
  22519. <exception cref="T:System.IO.IOException"/>
  22520. </member>
  22521. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSupportedVersionsExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion[])">
  22522. <exception cref="T:System.IO.IOException"/>
  22523. </member>
  22524. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSupportedVersionsExtensionServer(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion)">
  22525. <exception cref="T:System.IO.IOException"/>
  22526. </member>
  22527. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddTrustedCAKeysExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TrustedAuthority})">
  22528. <exception cref="T:System.IO.IOException"/>
  22529. </member>
  22530. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetAlpnExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22531. <returns>an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName"/>.</returns>
  22532. <exception cref="T:System.IO.IOException"/>
  22533. </member>
  22534. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetAlpnExtensionServer(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22535. <exception cref="T:System.IO.IOException"/>
  22536. </member>
  22537. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetCertificateAuthoritiesExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22538. <exception cref="T:System.IO.IOException"/>
  22539. </member>
  22540. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetClientCertificateTypeExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22541. <exception cref="T:System.IO.IOException"/>
  22542. </member>
  22543. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetClientCertificateTypeExtensionServer(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int16)">
  22544. <exception cref="T:System.IO.IOException"/>
  22545. </member>
  22546. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetCompressCertificateExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22547. <exception cref="T:System.IO.IOException"/>
  22548. </member>
  22549. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetCookieExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22550. <exception cref="T:System.IO.IOException"/>
  22551. </member>
  22552. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetEarlyDataMaxSize(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22553. <exception cref="T:System.IO.IOException"/>
  22554. </member>
  22555. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetHeartbeatExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22556. <exception cref="T:System.IO.IOException"/>
  22557. </member>
  22558. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetKeyShareClientHello(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22559. <exception cref="T:System.IO.IOException"/>
  22560. </member>
  22561. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetKeyShareHelloRetryRequest(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22562. <exception cref="T:System.IO.IOException"/>
  22563. </member>
  22564. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetKeyShareServerHello(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22565. <exception cref="T:System.IO.IOException"/>
  22566. </member>
  22567. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetMaxFragmentLengthExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22568. <exception cref="T:System.IO.IOException"/>
  22569. </member>
  22570. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetOidFiltersExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22571. <exception cref="T:System.IO.IOException"/>
  22572. </member>
  22573. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetPaddingExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22574. <exception cref="T:System.IO.IOException"/>
  22575. </member>
  22576. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetPreSharedKeyClientHello(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22577. <exception cref="T:System.IO.IOException"/>
  22578. </member>
  22579. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetPreSharedKeyServerHello(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22580. <exception cref="T:System.IO.IOException"/>
  22581. </member>
  22582. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetPskKeyExchangeModesExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22583. <exception cref="T:System.IO.IOException"/>
  22584. </member>
  22585. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetRecordSizeLimitExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22586. <exception cref="T:System.IO.IOException"/>
  22587. </member>
  22588. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetServerCertificateTypeExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22589. <exception cref="T:System.IO.IOException"/>
  22590. </member>
  22591. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetServerCertificateTypeExtensionServer(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int16)">
  22592. <exception cref="T:System.IO.IOException"/>
  22593. </member>
  22594. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetServerNameExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22595. <exception cref="T:System.IO.IOException"/>
  22596. </member>
  22597. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSignatureAlgorithmsExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22598. <exception cref="T:System.IO.IOException"/>
  22599. </member>
  22600. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSignatureAlgorithmsCertExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22601. <exception cref="T:System.IO.IOException"/>
  22602. </member>
  22603. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetStatusRequestExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22604. <exception cref="T:System.IO.IOException"/>
  22605. </member>
  22606. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetStatusRequestV2Extension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22607. <exception cref="T:System.IO.IOException"/>
  22608. </member>
  22609. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSupportedGroupsExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22610. <exception cref="T:System.IO.IOException"/>
  22611. </member>
  22612. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSupportedPointFormatsExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22613. <exception cref="T:System.IO.IOException"/>
  22614. </member>
  22615. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSupportedVersionsExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22616. <exception cref="T:System.IO.IOException"/>
  22617. </member>
  22618. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSupportedVersionsExtensionServer(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22619. <exception cref="T:System.IO.IOException"/>
  22620. </member>
  22621. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetTrustedCAKeysExtensionClient(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22622. <exception cref="T:System.IO.IOException"/>
  22623. </member>
  22624. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasClientCertificateUrlExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22625. <exception cref="T:System.IO.IOException"/>
  22626. </member>
  22627. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasEarlyDataIndication(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22628. <exception cref="T:System.IO.IOException"/>
  22629. </member>
  22630. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasEncryptThenMacExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22631. <exception cref="T:System.IO.IOException"/>
  22632. </member>
  22633. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasExtendedMasterSecretExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22634. <exception cref="T:System.IO.IOException"/>
  22635. </member>
  22636. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasServerNameExtensionServer(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22637. <exception cref="T:System.IO.IOException"/>
  22638. </member>
  22639. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasPostHandshakeAuthExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22640. <exception cref="T:System.IO.IOException"/>
  22641. </member>
  22642. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasTruncatedHmacExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22643. <exception cref="T:System.IO.IOException"/>
  22644. </member>
  22645. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasTrustedCAKeysExtensionServer(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  22646. <exception cref="T:System.IO.IOException"/>
  22647. </member>
  22648. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateAlpnExtensionClient(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName})">
  22649. <param name="protocolNameList">an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName"/>.</param>
  22650. <exception cref="T:System.IO.IOException"/>
  22651. </member>
  22652. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateAlpnExtensionServer(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName)">
  22653. <exception cref="T:System.IO.IOException"/>
  22654. </member>
  22655. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateCertificateAuthoritiesExtension(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name})">
  22656. <exception cref="T:System.IO.IOException"/>
  22657. </member>
  22658. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateCertificateTypeExtensionClient(System.Int16[])">
  22659. <exception cref="T:System.IO.IOException"/>
  22660. </member>
  22661. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateCertificateTypeExtensionServer(System.Int16)">
  22662. <exception cref="T:System.IO.IOException"/>
  22663. </member>
  22664. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateCompressCertificateExtension(System.Int32[])">
  22665. <exception cref="T:System.IO.IOException"/>
  22666. </member>
  22667. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateCookieExtension(System.Byte[])">
  22668. <exception cref="T:System.IO.IOException"/>
  22669. </member>
  22670. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateEarlyDataMaxSize(System.Int64)">
  22671. <exception cref="T:System.IO.IOException"/>
  22672. </member>
  22673. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateHeartbeatExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatExtension)">
  22674. <exception cref="T:System.IO.IOException"/>
  22675. </member>
  22676. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateKeyShareClientHello(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry})">
  22677. <exception cref="T:System.IO.IOException"/>
  22678. </member>
  22679. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateKeyShareHelloRetryRequest(System.Int32)">
  22680. <exception cref="T:System.IO.IOException"/>
  22681. </member>
  22682. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateKeyShareServerHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.KeyShareEntry)">
  22683. <exception cref="T:System.IO.IOException"/>
  22684. </member>
  22685. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateMaxFragmentLengthExtension(System.Int16)">
  22686. <exception cref="T:System.IO.IOException"/>
  22687. </member>
  22688. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateOidFiltersExtension(System.Collections.Generic.IDictionary{Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Byte[]})">
  22689. <exception cref="T:System.IO.IOException"/>
  22690. </member>
  22691. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreatePaddingExtension(System.Int32)">
  22692. <exception cref="T:System.IO.IOException"/>
  22693. </member>
  22694. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreatePreSharedKeyClientHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OfferedPsks)">
  22695. <exception cref="T:System.IO.IOException"/>
  22696. </member>
  22697. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreatePreSharedKeyServerHello(System.Int32)">
  22698. <exception cref="T:System.IO.IOException"/>
  22699. </member>
  22700. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreatePskKeyExchangeModesExtension(System.Int16[])">
  22701. <exception cref="T:System.IO.IOException"/>
  22702. </member>
  22703. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateRecordSizeLimitExtension(System.Int32)">
  22704. <exception cref="T:System.IO.IOException"/>
  22705. </member>
  22706. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateServerNameExtensionClient(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName})">
  22707. <exception cref="T:System.IO.IOException"/>
  22708. </member>
  22709. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSignatureAlgorithmsExtension(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm})">
  22710. <exception cref="T:System.IO.IOException"/>
  22711. </member>
  22712. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSignatureAlgorithmsCertExtension(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm})">
  22713. <exception cref="T:System.IO.IOException"/>
  22714. </member>
  22715. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateStatusRequestExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequest)">
  22716. <exception cref="T:System.IO.IOException"/>
  22717. </member>
  22718. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateStatusRequestV2Extension(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatusRequestItemV2})">
  22719. <exception cref="T:System.IO.IOException"/>
  22720. </member>
  22721. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSupportedGroupsExtension(System.Collections.Generic.IList{System.Int32})">
  22722. <exception cref="T:System.IO.IOException"/>
  22723. </member>
  22724. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSupportedPointFormatsExtension(System.Int16[])">
  22725. <exception cref="T:System.IO.IOException"/>
  22726. </member>
  22727. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSupportedVersionsExtensionClient(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion[])">
  22728. <exception cref="T:System.IO.IOException"/>
  22729. </member>
  22730. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSupportedVersionsExtensionServer(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion)">
  22731. <exception cref="T:System.IO.IOException"/>
  22732. </member>
  22733. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateTrustedCAKeysExtensionClient(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TrustedAuthority})">
  22734. <exception cref="T:System.IO.IOException"/>
  22735. </member>
  22736. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadEmptyExtensionData(System.Byte[])">
  22737. <exception cref="T:System.IO.IOException"/>
  22738. </member>
  22739. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadAlpnExtensionClient(System.Byte[])">
  22740. <returns>an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName"/>.</returns>
  22741. <exception cref="T:System.IO.IOException"/>
  22742. </member>
  22743. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadAlpnExtensionServer(System.Byte[])">
  22744. <exception cref="T:System.IO.IOException"/>
  22745. </member>
  22746. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadCertificateAuthoritiesExtension(System.Byte[])">
  22747. <exception cref="T:System.IO.IOException"/>
  22748. </member>
  22749. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadCertificateTypeExtensionClient(System.Byte[])">
  22750. <exception cref="T:System.IO.IOException"/>
  22751. </member>
  22752. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadCertificateTypeExtensionServer(System.Byte[])">
  22753. <exception cref="T:System.IO.IOException"/>
  22754. </member>
  22755. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadClientCertificateUrlExtension(System.Byte[])">
  22756. <exception cref="T:System.IO.IOException"/>
  22757. </member>
  22758. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadCompressCertificateExtension(System.Byte[])">
  22759. <exception cref="T:System.IO.IOException"/>
  22760. </member>
  22761. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadCookieExtension(System.Byte[])">
  22762. <exception cref="T:System.IO.IOException"/>
  22763. </member>
  22764. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadEarlyDataIndication(System.Byte[])">
  22765. <exception cref="T:System.IO.IOException"/>
  22766. </member>
  22767. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadEarlyDataMaxSize(System.Byte[])">
  22768. <exception cref="T:System.IO.IOException"/>
  22769. </member>
  22770. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadEncryptThenMacExtension(System.Byte[])">
  22771. <exception cref="T:System.IO.IOException"/>
  22772. </member>
  22773. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadExtendedMasterSecretExtension(System.Byte[])">
  22774. <exception cref="T:System.IO.IOException"/>
  22775. </member>
  22776. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadHeartbeatExtension(System.Byte[])">
  22777. <exception cref="T:System.IO.IOException"/>
  22778. </member>
  22779. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadKeyShareClientHello(System.Byte[])">
  22780. <exception cref="T:System.IO.IOException"/>
  22781. </member>
  22782. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadKeyShareHelloRetryRequest(System.Byte[])">
  22783. <exception cref="T:System.IO.IOException"/>
  22784. </member>
  22785. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadKeyShareServerHello(System.Byte[])">
  22786. <exception cref="T:System.IO.IOException"/>
  22787. </member>
  22788. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadMaxFragmentLengthExtension(System.Byte[])">
  22789. <exception cref="T:System.IO.IOException"/>
  22790. </member>
  22791. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadOidFiltersExtension(System.Byte[])">
  22792. <exception cref="T:System.IO.IOException"/>
  22793. </member>
  22794. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadPaddingExtension(System.Byte[])">
  22795. <exception cref="T:System.IO.IOException"/>
  22796. </member>
  22797. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadPostHandshakeAuthExtension(System.Byte[])">
  22798. <exception cref="T:System.IO.IOException"/>
  22799. </member>
  22800. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadPreSharedKeyClientHello(System.Byte[])">
  22801. <exception cref="T:System.IO.IOException"/>
  22802. </member>
  22803. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadPreSharedKeyServerHello(System.Byte[])">
  22804. <exception cref="T:System.IO.IOException"/>
  22805. </member>
  22806. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadPskKeyExchangeModesExtension(System.Byte[])">
  22807. <exception cref="T:System.IO.IOException"/>
  22808. </member>
  22809. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadRecordSizeLimitExtension(System.Byte[])">
  22810. <exception cref="T:System.IO.IOException"/>
  22811. </member>
  22812. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadServerNameExtensionClient(System.Byte[])">
  22813. <exception cref="T:System.IO.IOException"/>
  22814. </member>
  22815. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadServerNameExtensionServer(System.Byte[])">
  22816. <exception cref="T:System.IO.IOException"/>
  22817. </member>
  22818. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSignatureAlgorithmsExtension(System.Byte[])">
  22819. <exception cref="T:System.IO.IOException"/>
  22820. </member>
  22821. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSignatureAlgorithmsCertExtension(System.Byte[])">
  22822. <exception cref="T:System.IO.IOException"/>
  22823. </member>
  22824. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadStatusRequestExtension(System.Byte[])">
  22825. <exception cref="T:System.IO.IOException"/>
  22826. </member>
  22827. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadStatusRequestV2Extension(System.Byte[])">
  22828. <exception cref="T:System.IO.IOException"/>
  22829. </member>
  22830. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSupportedGroupsExtension(System.Byte[])">
  22831. <exception cref="T:System.IO.IOException"/>
  22832. </member>
  22833. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSupportedPointFormatsExtension(System.Byte[])">
  22834. <exception cref="T:System.IO.IOException"/>
  22835. </member>
  22836. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSupportedVersionsExtensionClient(System.Byte[])">
  22837. <exception cref="T:System.IO.IOException"/>
  22838. </member>
  22839. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSupportedVersionsExtensionServer(System.Byte[])">
  22840. <exception cref="T:System.IO.IOException"/>
  22841. </member>
  22842. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadTruncatedHmacExtension(System.Byte[])">
  22843. <exception cref="T:System.IO.IOException"/>
  22844. </member>
  22845. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadTrustedCAKeysExtensionClient(System.Byte[])">
  22846. <exception cref="T:System.IO.IOException"/>
  22847. </member>
  22848. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadTrustedCAKeysExtensionServer(System.Byte[])">
  22849. <exception cref="T:System.IO.IOException"/>
  22850. </member>
  22851. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsExtensionsUtilities.PatchOpaque16(System.IO.MemoryStream)">
  22852. <exception cref="T:System.IO.IOException"/>
  22853. </member>
  22854. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsHandshakeHash">
  22855. <summary>Base interface for an object that can calculate a handshake hash.</summary>
  22856. </member>
  22857. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsHandshakeHash.CopyBufferTo(System.IO.Stream)">
  22858. <exception cref="T:System.IO.IOException"/>
  22859. </member>
  22860. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange">
  22861. <summary>A generic interface for key exchange implementations in (D)TLS.</summary>
  22862. </member>
  22863. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.SkipServerCredentials">
  22864. <exception cref="T:System.IO.IOException"/>
  22865. </member>
  22866. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.ProcessServerCredentials(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentials)">
  22867. <exception cref="T:System.IO.IOException"/>
  22868. </member>
  22869. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.ProcessServerCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate)">
  22870. <exception cref="T:System.IO.IOException"/>
  22871. </member>
  22872. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.GenerateServerKeyExchange">
  22873. <exception cref="T:System.IO.IOException"/>
  22874. </member>
  22875. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.SkipServerKeyExchange">
  22876. <exception cref="T:System.IO.IOException"/>
  22877. </member>
  22878. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.ProcessServerKeyExchange(System.IO.Stream)">
  22879. <exception cref="T:System.IO.IOException"/>
  22880. </member>
  22881. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.SkipClientCredentials">
  22882. <exception cref="T:System.IO.IOException"/>
  22883. </member>
  22884. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.ProcessClientCredentials(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentials)">
  22885. <exception cref="T:System.IO.IOException"/>
  22886. </member>
  22887. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.ProcessClientCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate)">
  22888. <exception cref="T:System.IO.IOException"/>
  22889. </member>
  22890. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.GenerateClientKeyExchange(System.IO.Stream)">
  22891. <exception cref="T:System.IO.IOException"/>
  22892. </member>
  22893. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.ProcessClientKeyExchange(System.IO.Stream)">
  22894. <exception cref="T:System.IO.IOException"/>
  22895. </member>
  22896. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange.GeneratePreMasterSecret">
  22897. <exception cref="T:System.IO.IOException"/>
  22898. </member>
  22899. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory">
  22900. <summary>Interface for a key exchange factory offering a variety of specific algorithms.</summary>
  22901. </member>
  22902. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateDHKeyExchange(System.Int32)">
  22903. <exception cref="T:System.IO.IOException"/>
  22904. </member>
  22905. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateDHanonKeyExchangeClient(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHGroupVerifier)">
  22906. <exception cref="T:System.IO.IOException"/>
  22907. </member>
  22908. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateDHanonKeyExchangeServer(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsDHConfig)">
  22909. <exception cref="T:System.IO.IOException"/>
  22910. </member>
  22911. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateDheKeyExchangeClient(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHGroupVerifier)">
  22912. <exception cref="T:System.IO.IOException"/>
  22913. </member>
  22914. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateDheKeyExchangeServer(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsDHConfig)">
  22915. <exception cref="T:System.IO.IOException"/>
  22916. </member>
  22917. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateECDHKeyExchange(System.Int32)">
  22918. <exception cref="T:System.IO.IOException"/>
  22919. </member>
  22920. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateECDHanonKeyExchangeClient(System.Int32)">
  22921. <exception cref="T:System.IO.IOException"/>
  22922. </member>
  22923. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateECDHanonKeyExchangeServer(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsECConfig)">
  22924. <exception cref="T:System.IO.IOException"/>
  22925. </member>
  22926. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateECDheKeyExchangeClient(System.Int32)">
  22927. <exception cref="T:System.IO.IOException"/>
  22928. </member>
  22929. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateECDheKeyExchangeServer(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsECConfig)">
  22930. <exception cref="T:System.IO.IOException"/>
  22931. </member>
  22932. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreatePskKeyExchangeClient(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPskIdentity,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsDHGroupVerifier)">
  22933. <exception cref="T:System.IO.IOException"/>
  22934. </member>
  22935. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreatePskKeyExchangeServer(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPskIdentityManager,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsDHConfig,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsECConfig)">
  22936. <exception cref="T:System.IO.IOException"/>
  22937. </member>
  22938. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateRsaKeyExchange(System.Int32)">
  22939. <exception cref="T:System.IO.IOException"/>
  22940. </member>
  22941. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateSrpKeyExchangeClient(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpIdentity,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpConfigVerifier)">
  22942. <exception cref="T:System.IO.IOException"/>
  22943. </member>
  22944. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateSrpKeyExchangeServer(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpLoginParameters)">
  22945. <exception cref="T:System.IO.IOException"/>
  22946. </member>
  22947. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsNoCloseNotifyException">
  22948. <summary>This exception will be thrown (only) when the connection is closed by the peer without sending a
  22949. <see cref="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription.close_notify">close_notify</see> warning alert.</summary>
  22950. <remarks>
  22951. If this happens, the TLS protocol cannot rule out truncation of the connection data (potentially
  22952. malicious). It may be possible to check for truncation via some property of a higher level protocol
  22953. built upon TLS, e.g.the Content-Length header for HTTPS.
  22954. </remarks>
  22955. </member>
  22956. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsObjectIdentifiers">
  22957. <summary>Object Identifiers associated with TLS extensions.</summary>
  22958. </member>
  22959. <member name="F:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsObjectIdentifiers.id_pe_tlsfeature">
  22960. <summary>RFC 7633</summary>
  22961. </member>
  22962. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer">
  22963. <summary>Base interface for a (D)TLS endpoint.</summary>
  22964. </member>
  22965. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.Cancel">
  22966. <exception cref="T:System.IO.IOException"/>
  22967. </member>
  22968. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeBeginning">
  22969. <summary>Notifies the peer that a new handshake is about to begin.</summary>
  22970. <exception cref="T:System.IO.IOException"/>
  22971. </member>
  22972. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.GetHandshakeTimeoutMillis">
  22973. <summary>Specify the timeout, in milliseconds, to use for the complete handshake process.</summary>
  22974. <remarks>
  22975. NOTE: Currently only respected by DTLS protocols. Negative values are not allowed. A timeout of zero means
  22976. an infinite timeout (i.e.the handshake will never time out).
  22977. </remarks>
  22978. <returns>the handshake timeout, in milliseconds.</returns>
  22979. </member>
  22980. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.RequiresCloseNotify">
  22981. <remarks>
  22982. This option is provided as a last resort for interoperability with TLS peers that fail to correctly send a
  22983. close_notify alert at end of stream. Implementations SHOULD return true; caution is advised if returning
  22984. false without a full understanding of the implications.
  22985. </remarks>
  22986. </member>
  22987. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.RequiresExtendedMasterSecret">
  22988. <remarks>This implementation supports RFC 7627 and will always negotiate the extended_master_secret
  22989. extension where possible. When connecting to a peer that does not offer/accept this extension, it is
  22990. recommended to abort the handshake.This option is provided for interoperability with legacy peers, although
  22991. some TLS features will be disabled in that case (see RFC 7627 5.4).
  22992. </remarks>
  22993. <returns><c>true</c> if the handshake should be aborted when the peer does not negotiate the
  22994. extended_master_secret extension, or <c>false</c> to support legacy interoperability.</returns>
  22995. </member>
  22996. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.ShouldUseExtendedPadding">
  22997. <summary>See RFC 5246 6.2.3.2. Controls whether block cipher encryption may randomly add extra padding
  22998. beyond the minimum.</summary>
  22999. <remarks>
  23000. Note that in configurations where this is known to be potential security risk this setting will be ignored
  23001. (and extended padding disabled). Extra padding is always supported when decrypting received records.
  23002. </remarks>
  23003. <returns><c>true</c> if random extra padding should be added during block cipher encryption, or
  23004. <c>false</c> to always use the minimum amount of required padding.</returns>
  23005. </member>
  23006. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.ShouldUseGmtUnixTime">
  23007. <summary> draft-mathewson-no-gmtunixtime-00 2. "If existing users of a TLS implementation may rely on
  23008. gmt_unix_time containing the current time, we recommend that implementors MAY provide the ability to set
  23009. gmt_unix_time as an option only, off by default.".</summary>
  23010. <remarks>
  23011. NOTE: For a server that has negotiated TLS 1.3 (or later), or a client that has offered TLS 1.3 (or later),
  23012. this is not called and gmt_unix_time is not used.
  23013. </remarks>
  23014. <returns><c>true</c> if the current time should be used in the gmt_unix_time field of Random, or
  23015. <c>false</c> if gmt_unix_time should contain a cryptographically random value.</returns>
  23016. </member>
  23017. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.NotifySecureRenegotiation(System.Boolean)">
  23018. <summary>RFC 5746 3.4/3.6. In case this is false, peers may want to terminate the handshake instead of
  23019. continuing; see Section 4.1/4.3 for discussion.</summary>
  23020. <remarks>
  23021. NOTE: TLS 1.3 forbids renegotiation, so this is never called when TLS 1.3 (or later) was negotiated.
  23022. </remarks>
  23023. <exception cref="T:System.IO.IOException"/>
  23024. </member>
  23025. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.GetKeyExchangeFactory">
  23026. <exception cref="T:System.IO.IOException"/>
  23027. </member>
  23028. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.NotifyAlertRaised(System.Int16,System.Int16,System.String,System.Exception)">
  23029. <summary>This method will be called when an alert is raised by the protocol.</summary>
  23030. <param name="alertLevel"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertLevel"/></param>
  23031. <param name="alertDescription"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription"/></param>
  23032. <param name="message">A human-readable message explaining what caused this alert. May be null.</param>
  23033. <param name="cause">The <see cref="T:System.Exception"/> that caused this alert to be raised. May be null.</param>
  23034. </member>
  23035. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.NotifyAlertReceived(System.Int16,System.Int16)">
  23036. <summary>This method will be called when an alert is received from the remote peer.</summary>
  23037. <param name="alertLevel"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertLevel"/></param>
  23038. <param name="alertDescription"><see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.AlertDescription"/></param>
  23039. </member>
  23040. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeComplete">
  23041. <summary>Notifies the peer that the handshake has been successfully completed.</summary>
  23042. <exception cref="T:System.IO.IOException"/>
  23043. </member>
  23044. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.GetHeartbeat">
  23045. <summary>Return a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsHeartbeat"/> instance that will control the generation of heartbeats
  23046. locally (if permitted by the remote peer), or null to not generate heartbeats. Heartbeats are described in
  23047. RFC 6520.</summary>
  23048. <returns>an instance of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsHeartbeat"/>.</returns>
  23049. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DefaultTlsHeartbeat"/>
  23050. </member>
  23051. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.GetHeartbeatPolicy">
  23052. <summary>Return the heartbeat mode applicable to the remote peer. Heartbeats are described in RFC 6520.
  23053. </summary>
  23054. <remarks>
  23055. See enumeration class <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatMode"/> for appropriate return values.
  23056. </remarks>
  23057. <returns>the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HeartbeatMode"/> value.</returns>
  23058. </member>
  23059. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.IgnoreCorruptDtlsRecords">
  23060. <summary>Indicates whether a DTLS connection should ignore corrupt records (bad_record_mac) instead of
  23061. failing the connection.</summary>
  23062. <remarks>Called only once at the start of a connection and applies throughout.</remarks>
  23063. <returns>The value <c>true</c> to ignore corrupt DTLS records, or <c>false</c> to fail the connection.
  23064. </returns>
  23065. </member>
  23066. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ResumeHandshake">
  23067. <exception cref="T:System.IO.IOException"/>
  23068. </member>
  23069. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.CloseConnection">
  23070. <exception cref="T:System.IO.IOException"/>
  23071. </member>
  23072. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.HandleAlertMessage(System.Int16,System.Int16)">
  23073. <exception cref="T:System.IO.IOException"/>
  23074. </member>
  23075. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.HandleAlertWarningMessage(System.Int16)">
  23076. <exception cref="T:System.IO.IOException"/>
  23077. </member>
  23078. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.HandleChangeCipherSpecMessage">
  23079. <exception cref="T:System.IO.IOException"/>
  23080. </member>
  23081. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.HandleClose(System.Boolean)">
  23082. <exception cref="T:System.IO.IOException"/>
  23083. </member>
  23084. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.HandleException(System.Int16,System.String,System.Exception)">
  23085. <exception cref="T:System.IO.IOException"/>
  23086. </member>
  23087. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.HandleFailure">
  23088. <exception cref="T:System.IO.IOException"/>
  23089. </member>
  23090. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.HandleHandshakeMessage(System.Int16,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HandshakeMessageInput)">
  23091. <exception cref="T:System.IO.IOException"/>
  23092. </member>
  23093. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ApplyMaxFragmentLengthExtension(System.Int16)">
  23094. <exception cref="T:System.IO.IOException"/>
  23095. </member>
  23096. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.CheckReceivedChangeCipherSpec(System.Boolean)">
  23097. <exception cref="T:System.IO.IOException"/>
  23098. </member>
  23099. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.BlockForHandshake">
  23100. <exception cref="T:System.IO.IOException"/>
  23101. </member>
  23102. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.BeginHandshake(System.Boolean)">
  23103. <exception cref="T:System.IO.IOException"/>
  23104. </member>
  23105. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.CompleteHandshake">
  23106. <exception cref="T:System.IO.IOException"/>
  23107. </member>
  23108. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ProcessRecord(System.Int16,System.Byte[],System.Int32,System.Int32)">
  23109. <exception cref="T:System.IO.IOException"/>
  23110. </member>
  23111. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ProcessHandshakeQueue(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ByteQueue)">
  23112. <exception cref="T:System.IO.IOException"/>
  23113. </member>
  23114. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ProcessAlertQueue">
  23115. <exception cref="T:System.IO.IOException"/>
  23116. </member>
  23117. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ProcessChangeCipherSpec(System.Byte[],System.Int32,System.Int32)">
  23118. <summary>This method is called, when a change cipher spec message is received.</summary>
  23119. <exception cref="T:System.IO.IOException">If the message has an invalid content or the handshake is not in the correct
  23120. state.</exception>
  23121. </member>
  23122. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadApplicationData(System.Byte[],System.Int32,System.Int32)">
  23123. <summary>Read data from the network.</summary>
  23124. <remarks>
  23125. The method will return immediately, if there is still some data left in the buffer, or block until some
  23126. application data has been read from the network.
  23127. </remarks>
  23128. <param name="buffer">The buffer where the data will be copied to.</param>
  23129. <param name="offset">The position where the data will be placed in the buffer.</param>
  23130. <param name="count">The maximum number of bytes to read.</param>
  23131. <returns>The number of bytes read.</returns>
  23132. <exception cref="T:System.IO.IOException">If something goes wrong during reading data.</exception>
  23133. </member>
  23134. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.SafePreviewRecordHeader(System.Byte[])">
  23135. <exception cref="T:System.IO.IOException"/>
  23136. </member>
  23137. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.SafeReadRecord">
  23138. <exception cref="T:System.IO.IOException"/>
  23139. </member>
  23140. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.SafeReadFullRecord(System.Byte[],System.Int32,System.Int32)">
  23141. <exception cref="T:System.IO.IOException"/>
  23142. </member>
  23143. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.SafeWriteRecord(System.Int16,System.Byte[],System.Int32,System.Int32)">
  23144. <exception cref="T:System.IO.IOException"/>
  23145. </member>
  23146. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.SafeWriteRecord(System.Int16,System.ReadOnlySpan{System.Byte})">
  23147. <exception cref="T:System.IO.IOException"/>
  23148. </member>
  23149. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteApplicationData(System.Byte[],System.Int32,System.Int32)">
  23150. <summary>Write some application data.</summary>
  23151. <remarks>
  23152. Fragmentation is handled internally. Usable in both blocking/non-blocking modes.<br/><br/>
  23153. In blocking mode, the output will be automatically sent via the underlying transport. In non-blocking mode,
  23154. call <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadOutput(System.Byte[],System.Int32,System.Int32)"/> to get the output bytes to send to the peer.<br/><br/>
  23155. This method must not be called until after the initial handshake is complete. Attempting to call it earlier
  23156. will result in an <see cref="T:System.InvalidOperationException"/>.
  23157. </remarks>
  23158. <param name="buffer">The buffer containing application data to send.</param>
  23159. <param name="offset">The offset at which the application data begins</param>
  23160. <param name="count">The number of bytes of application data.</param>
  23161. <exception cref="T:System.InvalidOperationException">If called before the initial handshake has completed.
  23162. </exception>
  23163. <exception cref="T:System.IO.IOException">If connection is already closed, or for encryption or transport errors.
  23164. </exception>
  23165. </member>
  23166. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteHandshakeMessage(System.Byte[],System.Int32,System.Int32)">
  23167. <exception cref="T:System.IO.IOException"/>
  23168. </member>
  23169. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.Stream">
  23170. <summary>The secure bidirectional stream for this connection</summary>
  23171. <remarks>Only allowed in blocking mode.</remarks>
  23172. </member>
  23173. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.CloseInput">
  23174. <summary>Should be called in non-blocking mode when the input data reaches EOF.</summary>
  23175. <exception cref="T:System.IO.IOException"/>
  23176. </member>
  23177. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.PreviewInputRecord(System.Byte[])">
  23178. <exception cref="T:System.IO.IOException"/>
  23179. </member>
  23180. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.PreviewOutputRecord(System.Int32)">
  23181. <exception cref="T:System.IO.IOException"/>
  23182. </member>
  23183. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.OfferInput(System.Byte[])">
  23184. <summary>Equivalent to <code>OfferInput(input, 0, input.Length)</code>.</summary>
  23185. <param name="input">The input buffer to offer.</param>
  23186. <exception cref="T:System.IO.IOException"/>
  23187. <seealso cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.OfferInput(System.Byte[],System.Int32,System.Int32)"/>
  23188. </member>
  23189. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.OfferInput(System.Byte[],System.Int32,System.Int32)">
  23190. <summary>Offer input from an arbitrary source.</summary>
  23191. <remarks>Only allowed in non-blocking mode.<br/><br/>
  23192. This method will decrypt and process all records that are fully available. If only part of a record is
  23193. available, the buffer will be retained until the remainder of the record is offered.<br/><br/>
  23194. If any records containing application data were processed, the decrypted data can be obtained using
  23195. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadInput(System.Byte[],System.Int32,System.Int32)"/>. If any records containing protocol data were processed, a
  23196. response may have been generated. You should always check to see if there is any available output after
  23197. calling this method by calling <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.GetAvailableOutputBytes"/>.
  23198. </remarks>
  23199. <param name="input">The input buffer to offer.</param>
  23200. <param name="inputOff">The offset within the input buffer that input begins.</param>
  23201. <param name="inputLen">The number of bytes of input being offered.</param>
  23202. <exception cref="T:System.IO.IOException">If an error occurs while decrypting or processing a record.</exception>
  23203. </member>
  23204. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.GetAvailableInputBytes">
  23205. <summary>Gets the amount of received application data.</summary>
  23206. <remarks>A call to <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadInput(System.Byte[],System.Int32,System.Int32)"/> is guaranteed to be able to return at least
  23207. this much data.<br/><br/>
  23208. Only allowed in non-blocking mode.
  23209. </remarks>
  23210. <returns>The number of bytes of available application data.</returns>
  23211. </member>
  23212. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadInput(System.Byte[],System.Int32,System.Int32)">
  23213. <summary>Retrieves received application data.</summary>
  23214. <remarks>
  23215. Use <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.GetAvailableInputBytes"/> to check how much application data is currently available. This
  23216. method functions similarly to <see cref="M:System.IO.Stream.Read(System.Byte[],System.Int32,System.Int32)"/>, except that it never blocks. If
  23217. no data is available, nothing will be copied and zero will be returned.<br/><br/>
  23218. Only allowed in non-blocking mode.
  23219. </remarks>
  23220. <param name="buf">The buffer to hold the application data.</param>
  23221. <param name="off">The start offset in the buffer at which the data is written.</param>
  23222. <param name="len">The maximum number of bytes to read.</param>
  23223. <returns>The total number of bytes copied to the buffer. May be less than the length specified if the
  23224. length was greater than the amount of available data.</returns>
  23225. </member>
  23226. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.GetAvailableOutputBytes">
  23227. <summary>Gets the amount of encrypted data available to be sent.</summary>
  23228. <remarks>
  23229. A call to <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadOutput(System.Byte[],System.Int32,System.Int32)"/> is guaranteed to be able to return at least this much
  23230. data. Only allowed in non-blocking mode.
  23231. </remarks>
  23232. <returns>The number of bytes of available encrypted data.</returns>
  23233. </member>
  23234. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadOutput(System.Byte[],System.Int32,System.Int32)">
  23235. <summary>Retrieves encrypted data to be sent.</summary>
  23236. <remarks>
  23237. Use <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.GetAvailableOutputBytes"/> to check how much encrypted data is currently available. This
  23238. method functions similarly to <see cref="M:System.IO.Stream.Read(System.Byte[],System.Int32,System.Int32)"/>, except that it never blocks. If
  23239. no data is available, nothing will be copied and zero will be returned. Only allowed in non-blocking mode.
  23240. </remarks>
  23241. <param name="buffer">The buffer to hold the encrypted data.</param>
  23242. <param name="offset">The start offset in the buffer at which the data is written.</param>
  23243. <param name="length">The maximum number of bytes to read.</param>
  23244. <returns>The total number of bytes copied to the buffer. May be less than the length specified if the
  23245. length was greater than the amount of available data.</returns>
  23246. </member>
  23247. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ProcessFinishedMessage(System.IO.MemoryStream)">
  23248. <exception cref="T:System.IO.IOException"/>
  23249. </member>
  23250. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.Process13FinishedMessage(System.IO.MemoryStream)">
  23251. <exception cref="T:System.IO.IOException"/>
  23252. </member>
  23253. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.RaiseAlertFatal(System.Int16,System.String,System.Exception)">
  23254. <exception cref="T:System.IO.IOException"/>
  23255. </member>
  23256. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.RaiseAlertWarning(System.Int16,System.String)">
  23257. <exception cref="T:System.IO.IOException"/>
  23258. </member>
  23259. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.Receive13KeyUpdate(System.IO.MemoryStream)">
  23260. <exception cref="T:System.IO.IOException"/>
  23261. </member>
  23262. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.SendCertificateMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate,System.IO.Stream)">
  23263. <exception cref="T:System.IO.IOException"/>
  23264. </member>
  23265. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.Send13CertificateMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate)">
  23266. <exception cref="T:System.IO.IOException"/>
  23267. </member>
  23268. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.Send13CertificateVerifyMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigitallySigned)">
  23269. <exception cref="T:System.IO.IOException"/>
  23270. </member>
  23271. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.SendChangeCipherSpec">
  23272. <exception cref="T:System.IO.IOException"/>
  23273. </member>
  23274. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.SendChangeCipherSpecMessage">
  23275. <exception cref="T:System.IO.IOException"/>
  23276. </member>
  23277. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.SendFinishedMessage">
  23278. <exception cref="T:System.IO.IOException"/>
  23279. </member>
  23280. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.Send13FinishedMessage">
  23281. <exception cref="T:System.IO.IOException"/>
  23282. </member>
  23283. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.Send13KeyUpdate(System.Boolean)">
  23284. <exception cref="T:System.IO.IOException"/>
  23285. </member>
  23286. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.SendSupplementalDataMessage(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SupplementalDataEntry})">
  23287. <exception cref="T:System.IO.IOException"/>
  23288. </member>
  23289. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ProcessMaxFragmentLengthExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int16)">
  23290. <exception cref="T:System.IO.IOException"/>
  23291. </member>
  23292. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.RefuseRenegotiation">
  23293. <exception cref="T:System.IO.IOException"/>
  23294. </member>
  23295. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.AssertEmpty(System.IO.MemoryStream)">
  23296. <summary>Make sure the <see cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.Stream"/> 'buf' is now empty. Fail otherwise.</summary>
  23297. <param name="buf">The <see cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.Stream"/> to check.</param>
  23298. <exception cref="T:System.IO.IOException"/>
  23299. </member>
  23300. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.CreateRenegotiationInfo(System.Byte[])">
  23301. <exception cref="T:System.IO.IOException"/>
  23302. </member>
  23303. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.EstablishMasterSecret(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsKeyExchange)">
  23304. <exception cref="T:System.IO.IOException"/>
  23305. </member>
  23306. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadExtensions(System.IO.MemoryStream)">
  23307. <exception cref="T:System.IO.IOException"/>
  23308. </member>
  23309. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadExtensionsData(System.Byte[])">
  23310. <exception cref="T:System.IO.IOException"/>
  23311. </member>
  23312. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadExtensionsData13(System.Int32,System.Byte[])">
  23313. <exception cref="T:System.IO.IOException"/>
  23314. </member>
  23315. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadExtensionsDataClientHello(System.Byte[])">
  23316. <exception cref="T:System.IO.IOException"/>
  23317. </member>
  23318. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadSupplementalDataMessage(System.IO.MemoryStream)">
  23319. <exception cref="T:System.IO.IOException"/>
  23320. </member>
  23321. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteExtensions(System.IO.Stream,System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  23322. <exception cref="T:System.IO.IOException"/>
  23323. </member>
  23324. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteExtensions(System.IO.Stream,System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int32)">
  23325. <exception cref="T:System.IO.IOException"/>
  23326. </member>
  23327. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteExtensionsData(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  23328. <exception cref="T:System.IO.IOException"/>
  23329. </member>
  23330. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteExtensionsData(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int32)">
  23331. <exception cref="T:System.IO.IOException"/>
  23332. </member>
  23333. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteExtensionsData(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.IO.MemoryStream)">
  23334. <exception cref="T:System.IO.IOException"/>
  23335. </member>
  23336. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteExtensionsData(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.IO.MemoryStream,System.Int32)">
  23337. <exception cref="T:System.IO.IOException"/>
  23338. </member>
  23339. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WritePreSharedKeyExtension(System.IO.MemoryStream,System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int32)">
  23340. <exception cref="T:System.IO.IOException"/>
  23341. </member>
  23342. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteSelectedExtensions(System.IO.Stream,System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Boolean)">
  23343. <exception cref="T:System.IO.IOException"/>
  23344. </member>
  23345. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteSupplementalData(System.IO.Stream,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SupplementalDataEntry})">
  23346. <exception cref="T:System.IO.IOException"/>
  23347. </member>
  23348. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPskIdentity">
  23349. <summary>Processor interface for a PSK identity.</summary>
  23350. </member>
  23351. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPskIdentityManager">
  23352. <summary>Base interface for an object that can process a PSK identity.</summary>
  23353. </member>
  23354. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPskKeyExchange">
  23355. <summary>(D)TLS PSK key exchange (RFC 4279).</summary>
  23356. </member>
  23357. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsRsaKeyExchange">
  23358. <summary>(D)TLS RSA key exchange.</summary>
  23359. </member>
  23360. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer">
  23361. <summary>Interface describing a TLS server endpoint.</summary>
  23362. </member>
  23363. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetSessionToResume(System.Byte[])">
  23364. <summary>Return the specified session, if available.</summary>
  23365. <remarks>
  23366. Note that the peer's certificate chain for the session (if any) may need to be periodically revalidated.
  23367. </remarks>
  23368. <param name="sessionID">the ID of the session to resume.</param>
  23369. <returns>A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSession"/> with the specified session ID, or null.</returns>
  23370. <seealso cref="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SessionParameters.PeerCertificate"/>
  23371. </member>
  23372. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetExternalPsk(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.PskIdentity})">
  23373. <summary>Return the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPskExternal">external PSK</see> to select from the ClientHello.</summary>
  23374. <remarks>
  23375. WARNING: EXPERIMENTAL FEATURE, UNSTABLE API
  23376. Note that this will only be called when TLS 1.3 or higher is amongst the offered protocol versions, and one
  23377. or more PSKs are actually offered.
  23378. </remarks>
  23379. <param name="identities">an <see cref="T:System.Collections.Generic.IList`1"/> of <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.PskIdentity"/> instances.</param>
  23380. <returns>The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPskExternal"/> corresponding to the selected identity, or null to not select
  23381. any.</returns>
  23382. </member>
  23383. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.NotifyClientVersion(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion)">
  23384. <exception cref="T:System.IO.IOException"/>
  23385. </member>
  23386. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.NotifyFallback(System.Boolean)">
  23387. <exception cref="T:System.IO.IOException"/>
  23388. </member>
  23389. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.NotifyOfferedCipherSuites(System.Int32[])">
  23390. <exception cref="T:System.IO.IOException"/>
  23391. </member>
  23392. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.ProcessClientExtensions(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  23393. <param name="clientExtensions">(Int32 -> byte[])</param>
  23394. <exception cref="T:System.IO.IOException"/>
  23395. </member>
  23396. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetServerVersion">
  23397. <exception cref="T:System.IO.IOException"/>
  23398. </member>
  23399. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetSupportedGroups">
  23400. <exception cref="T:System.IO.IOException"/>
  23401. </member>
  23402. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetSelectedCipherSuite">
  23403. <exception cref="T:System.IO.IOException"/>
  23404. </member>
  23405. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetServerExtensions">
  23406. <returns>(Int32 -> byte[])</returns>
  23407. <exception cref="T:System.IO.IOException"/>
  23408. </member>
  23409. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetServerExtensionsForConnection(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  23410. <param name="serverExtensions">(Int32 -> byte[])</param>
  23411. <exception cref="T:System.IO.IOException"/>
  23412. </member>
  23413. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetServerSupplementalData">
  23414. <returns>(SupplementalDataEntry)</returns>
  23415. <exception cref="T:System.IO.IOException"/>
  23416. </member>
  23417. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetCredentials">
  23418. <summary>Return server credentials to use.</summary>
  23419. <remarks>
  23420. The returned value may be null, or else it MUST implement <em>exactly one</em> of
  23421. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedAgreement"/>, <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedDecryptor"/>, or
  23422. <see cref = "T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedSigner"/>, depending on the key exchange that was negotiated.
  23423. </remarks>
  23424. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentials"/> object or null for anonymous key exchanges.</returns>
  23425. <exception cref="T:System.IO.IOException"/>
  23426. </member>
  23427. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetCertificateStatus">
  23428. <remarks>
  23429. This method will be called (only) if the server included an extension of type "status_request" with empty
  23430. "extension_data" in the extended server hello. See <i>RFC 3546 3.6. Certificate Status Request</i>. If a
  23431. non-null <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus"/> is returned, it is sent to the client as a handshake message of
  23432. type "certificate_status".
  23433. </remarks>
  23434. <returns>A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus"/> to be sent to the client (or null for none).</returns>
  23435. <exception cref="T:System.IO.IOException"/>
  23436. </member>
  23437. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetCertificateRequest">
  23438. <exception cref="T:System.IO.IOException"/>
  23439. </member>
  23440. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetPskIdentityManager">
  23441. <exception cref="T:System.IO.IOException"/>
  23442. </member>
  23443. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetSrpLoginParameters">
  23444. <exception cref="T:System.IO.IOException"/>
  23445. </member>
  23446. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetDHConfig">
  23447. <exception cref="T:System.IO.IOException"/>
  23448. </member>
  23449. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetECDHConfig">
  23450. <exception cref="T:System.IO.IOException"/>
  23451. </member>
  23452. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.ProcessClientSupplementalData(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SupplementalDataEntry})">
  23453. <param name="clientSupplementalData">(SupplementalDataEntry)</param>
  23454. <exception cref="T:System.IO.IOException"/>
  23455. </member>
  23456. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.NotifyClientCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate)">
  23457. <summary>Called by the protocol handler to report the client certificate, only if
  23458. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetCertificateRequest"/> returned non-null.</summary>
  23459. <remarks>
  23460. Note: this method is responsible for certificate verification and validation.
  23461. </remarks>
  23462. <param name="clientCertificate">the effective client certificate (may be an empty chain).</param>
  23463. <exception cref="T:System.IO.IOException"/>
  23464. </member>
  23465. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer.GetNewSessionTicket">
  23466. <summary>RFC 5077 3.3. NewSessionTicket Handshake Message.</summary>
  23467. <remarks>
  23468. This method will be called (only) if a NewSessionTicket extension was sent by the server. See <i>RFC 5077
  23469. 4. Recommended Ticket Construction</i> for recommended format and protection.
  23470. </remarks>
  23471. <returns>The ticket.</returns>
  23472. <exception cref="T:System.IO.IOException"/>
  23473. </member>
  23474. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerCertificate">
  23475. <summary>Server certificate carrier interface.</summary>
  23476. </member>
  23477. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerContext">
  23478. <summary>Marker interface to distinguish a TLS server context.</summary>
  23479. </member>
  23480. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.#ctor">
  23481. <summary>Constructor for non-blocking mode.</summary>
  23482. <remarks>
  23483. When data is received, use <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.OfferInput(System.Byte[])"/> to provide the received ciphertext,
  23484. then use <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadInput(System.Byte[],System.Int32,System.Int32)"/> to read the corresponding cleartext.<br/><br/>
  23485. Similarly, when data needs to be sent, use <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.WriteApplicationData(System.Byte[],System.Int32,System.Int32)"/>
  23486. to provide the cleartext, then use <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsProtocol.ReadOutput(System.Byte[],System.Int32,System.Int32)"/> to get the
  23487. corresponding ciphertext.
  23488. </remarks>
  23489. </member>
  23490. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.#ctor(System.IO.Stream)">
  23491. <summary>Constructor for blocking mode.</summary>
  23492. <param name="stream">The <see cref="T:System.IO.Stream"/> of data to/from the server.</param>
  23493. </member>
  23494. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.#ctor(System.IO.Stream,System.IO.Stream)">
  23495. <summary>Constructor for blocking mode.</summary>
  23496. <param name="input">The <see cref="T:System.IO.Stream"/> of data from the server.</param>
  23497. <param name="output">The <see cref="T:System.IO.Stream"/> of data to the server.</param>
  23498. </member>
  23499. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.Accept(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer)">
  23500. <summary>Receives a TLS handshake in the role of server.</summary>
  23501. <remarks>
  23502. In blocking mode, this will not return until the handshake is complete. In non-blocking mode, use
  23503. <see cref="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeComplete"/> to receive a callback when the handshake is complete.
  23504. </remarks>
  23505. <param name="tlsServer">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer"/> to use for the handshake.</param>
  23506. <exception cref="T:System.IO.IOException">If in blocking mode and handshake was not successful.</exception>
  23507. </member>
  23508. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.Generate13HelloRetryRequest(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientHello)">
  23509. <exception cref="T:System.IO.IOException"/>
  23510. </member>
  23511. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.Generate13ServerHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientHello,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HandshakeMessageInput,System.Boolean)">
  23512. <exception cref="T:System.IO.IOException"/>
  23513. </member>
  23514. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.GenerateServerHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ClientHello,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HandshakeMessageInput)">
  23515. <exception cref="T:System.IO.IOException"/>
  23516. </member>
  23517. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.Handle13HandshakeMessage(System.Int16,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.HandshakeMessageInput)">
  23518. <exception cref="T:System.IO.IOException"/>
  23519. </member>
  23520. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.NotifyClientCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Certificate)">
  23521. <exception cref="T:System.IO.IOException"/>
  23522. </member>
  23523. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.Receive13ClientCertificate(System.IO.MemoryStream)">
  23524. <exception cref="T:System.IO.IOException"/>
  23525. </member>
  23526. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.Receive13ClientCertificateVerify(System.IO.MemoryStream)">
  23527. <exception cref="T:System.IO.IOException"/>
  23528. </member>
  23529. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.Receive13ClientFinished(System.IO.MemoryStream)">
  23530. <exception cref="T:System.IO.IOException"/>
  23531. </member>
  23532. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.ReceiveCertificateMessage(System.IO.MemoryStream)">
  23533. <exception cref="T:System.IO.IOException"/>
  23534. </member>
  23535. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.ReceiveCertificateVerifyMessage(System.IO.MemoryStream)">
  23536. <exception cref="T:System.IO.IOException"/>
  23537. </member>
  23538. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.ReceiveClientHelloMessage(System.IO.MemoryStream)">
  23539. <exception cref="T:System.IO.IOException"/>
  23540. </member>
  23541. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.ReceiveClientKeyExchangeMessage(System.IO.MemoryStream)">
  23542. <exception cref="T:System.IO.IOException"/>
  23543. </member>
  23544. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.Send13EncryptedExtensionsMessage(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  23545. <exception cref="T:System.IO.IOException"/>
  23546. </member>
  23547. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.Send13ServerHelloCoda(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerHello,System.Boolean)">
  23548. <exception cref="T:System.IO.IOException"/>
  23549. </member>
  23550. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.SendCertificateRequestMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest)">
  23551. <exception cref="T:System.IO.IOException"/>
  23552. </member>
  23553. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.SendCertificateStatusMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateStatus)">
  23554. <exception cref="T:System.IO.IOException"/>
  23555. </member>
  23556. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.SendHelloRequestMessage">
  23557. <exception cref="T:System.IO.IOException"/>
  23558. </member>
  23559. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.SendNewSessionTicketMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.NewSessionTicket)">
  23560. <exception cref="T:System.IO.IOException"/>
  23561. </member>
  23562. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.SendServerHelloDoneMessage">
  23563. <exception cref="T:System.IO.IOException"/>
  23564. </member>
  23565. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.SendServerHelloMessage(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerHello)">
  23566. <exception cref="T:System.IO.IOException"/>
  23567. </member>
  23568. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.SendServerKeyExchangeMessage(System.Byte[])">
  23569. <exception cref="T:System.IO.IOException"/>
  23570. </member>
  23571. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.Skip13ClientCertificate">
  23572. <exception cref="T:System.IO.IOException"/>
  23573. </member>
  23574. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerProtocol.Skip13ClientCertificateVerify">
  23575. <exception cref="T:System.IO.IOException"/>
  23576. </member>
  23577. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSession">
  23578. <summary>Base interface for a carrier object for a TLS session.</summary>
  23579. </member>
  23580. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpConfigVerifier">
  23581. <summary>Interface for verifying SRP config needs to conform to.</summary>
  23582. </member>
  23583. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpConfigVerifier.Accept(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrpConfig)">
  23584. <summary>Check whether the given SRP configuration is acceptable for use.</summary>
  23585. <param name="srpConfig">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsSrpConfig"/> to check.</param>
  23586. <returns>true if (and only if) the specified configuration is acceptable.</returns>
  23587. </member>
  23588. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpIdentity">
  23589. <summary>Processor interface for an SRP identity.</summary>
  23590. </member>
  23591. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpIdentityManager">
  23592. <summary>Base interface for an object that can return login parameters from an SRP identity.</summary>
  23593. </member>
  23594. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpIdentityManager.GetLoginParameters(System.Byte[])">
  23595. <summary>Lookup the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpLoginParameters"/> corresponding to the specified identity.</summary>
  23596. <remarks>
  23597. NOTE: To avoid "identity probing", unknown identities SHOULD be handled as recommended in RFC 5054 2.5.1.3.
  23598. <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SimulatedTlsSrpIdentityManager"/> is provided for this purpose.
  23599. </remarks>
  23600. <param name="identity">the SRP identity sent by the connecting client.</param>
  23601. <returns>the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpLoginParameters"/> for the specified identity, or else 'simulated' parameters
  23602. if the identity is not recognized. A null value is also allowed, but not recommended.</returns>
  23603. </member>
  23604. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpKeyExchange">
  23605. <summary>(D)TLS SRP key exchange (RFC 5054).</summary>
  23606. </member>
  23607. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpUtilities.AddSrpExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Byte[])">
  23608. <exception cref="T:System.IO.IOException"/>
  23609. </member>
  23610. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpUtilities.GetSrpExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  23611. <exception cref="T:System.IO.IOException"/>
  23612. </member>
  23613. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpUtilities.CreateSrpExtension(System.Byte[])">
  23614. <exception cref="T:System.IO.IOException"/>
  23615. </member>
  23616. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpUtilities.ReadSrpExtension(System.Byte[])">
  23617. <exception cref="T:System.IO.IOException"/>
  23618. </member>
  23619. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpUtilities.ReadSrpParameter(System.IO.Stream)">
  23620. <exception cref="T:System.IO.IOException"/>
  23621. </member>
  23622. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrpUtilities.WriteSrpParameter(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.IO.Stream)">
  23623. <exception cref="T:System.IO.IOException"/>
  23624. </member>
  23625. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrtpUtilities">
  23626. <summary>RFC 5764 DTLS Extension to Establish Keys for SRTP.</summary>
  23627. </member>
  23628. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrtpUtilities.AddUseSrtpExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UseSrtpData)">
  23629. <exception cref="T:System.IO.IOException"/>
  23630. </member>
  23631. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrtpUtilities.GetUseSrtpExtension(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  23632. <exception cref="T:System.IO.IOException"/>
  23633. </member>
  23634. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrtpUtilities.CreateUseSrtpExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UseSrtpData)">
  23635. <exception cref="T:System.IO.IOException"/>
  23636. </member>
  23637. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsSrtpUtilities.ReadUseSrtpExtension(System.Byte[])">
  23638. <exception cref="T:System.IO.IOException"/>
  23639. </member>
  23640. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.RequireDerEncoding(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable,System.Byte[])">
  23641. <exception cref="T:System.IO.IOException"/>
  23642. </member>
  23643. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.EncodeSupportedSignatureAlgorithms(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm},System.IO.Stream)">
  23644. <exception cref="T:System.IO.IOException"/>
  23645. </member>
  23646. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.ParseSupportedSignatureAlgorithms(System.IO.Stream)">
  23647. <exception cref="T:System.IO.IOException"/>
  23648. </member>
  23649. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.VerifySupportedSignatureAlgorithm(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm},Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm)">
  23650. <exception cref="T:System.IO.IOException"/>
  23651. </member>
  23652. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.VerifySupportedSignatureAlgorithm(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm},Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm,System.Int16)">
  23653. <exception cref="T:System.IO.IOException"/>
  23654. </member>
  23655. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.ContainsSignatureAlgorithm(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm},Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm)">
  23656. <exception cref="T:System.IO.IOException"/>
  23657. </member>
  23658. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.CalculateEndPointHash(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate,System.Byte[])">
  23659. <exception cref="T:System.IO.IOException"/>
  23660. </member>
  23661. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.CalculateEndPointHash(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate,System.Byte[],System.Int32,System.Int32)">
  23662. <exception cref="T:System.IO.IOException"/>
  23663. </member>
  23664. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.Verify13CertificateVerifyClient(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsHandshakeHash,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateVerify)">
  23665. <exception cref="T:System.IO.IOException"/>
  23666. </member>
  23667. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.Verify13CertificateVerifyServer(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsHandshakeHash,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateVerify)">
  23668. <exception cref="T:System.IO.IOException"/>
  23669. </member>
  23670. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.Verify13CertificateVerify(System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm},System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsHandshakeHash,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateVerify)">
  23671. <exception cref="T:System.IO.IOException"/>
  23672. </member>
  23673. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.GenerateServerKeyExchangeSignature(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentialedSigner,System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigestInputBuffer)">
  23674. <exception cref="T:System.IO.IOException"/>
  23675. </member>
  23676. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.VerifyServerKeyExchangeSignature(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate,System.Byte[],Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.DigestInputBuffer)">
  23677. <exception cref="T:System.IO.IOException"/>
  23678. </member>
  23679. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.IsAeadCipherSuite(System.Int32)">
  23680. <exception cref="T:System.IO.IOException"/>
  23681. </member>
  23682. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.IsBlockCipherSuite(System.Int32)">
  23683. <exception cref="T:System.IO.IOException"/>
  23684. </member>
  23685. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.IsStreamCipherSuite(System.Int32)">
  23686. <exception cref="T:System.IO.IOException"/>
  23687. </member>
  23688. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.IsValidCipherSuiteForSignatureAlgorithms(System.Int32,System.Collections.Generic.IList{System.Int16})">
  23689. <returns>Whether a server can select the specified cipher suite given the available signature algorithms
  23690. for ServerKeyExchange.</returns>
  23691. </member>
  23692. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.ChooseSignatureAndHashAlgorithm(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm},System.Int16)">
  23693. <exception cref="T:System.IO.IOException"/>
  23694. </member>
  23695. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.ChooseSignatureAndHashAlgorithm(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolVersion,System.Collections.Generic.IList{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SignatureAndHashAlgorithm},System.Int16)">
  23696. <exception cref="T:System.IO.IOException"/>
  23697. </member>
  23698. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.CreateKeyExchangeClient(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient,System.Int32)">
  23699. <exception cref="T:System.IO.IOException"/>
  23700. </member>
  23701. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.CreateKeyExchangeServer(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer,System.Int32)">
  23702. <exception cref="T:System.IO.IOException"/>
  23703. </member>
  23704. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.InitKeyExchangeClient(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient)">
  23705. <exception cref="T:System.IO.IOException"/>
  23706. </member>
  23707. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.InitKeyExchangeServer(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServerContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsServer)">
  23708. <exception cref="T:System.IO.IOException"/>
  23709. </member>
  23710. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.CheckPeerSigAlgs(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCertificate[])">
  23711. <summary>Check the signature algorithm for certificates in the peer's CertPath as specified in RFC 5246
  23712. 7.4.2, 7.4.4, 7.4.6 and similar rules for earlier TLS versions.</summary>
  23713. <remarks>
  23714. The supplied CertPath should include the trust anchor (its signature algorithm isn't checked, but in the
  23715. general case checking a certificate requires the issuer certificate).
  23716. </remarks>
  23717. <exception cref="T:System.IO.IOException">if any certificate in the CertPath (excepting the trust anchor) has a
  23718. signature algorithm that is not one of the locally supported signature algorithms.</exception>
  23719. </member>
  23720. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.RequireAgreementCredentials(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentials)">
  23721. <exception cref="T:System.IO.IOException"/>
  23722. </member>
  23723. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.RequireDecryptorCredentials(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentials)">
  23724. <exception cref="T:System.IO.IOException"/>
  23725. </member>
  23726. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.RequireSignerCredentials(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsCredentials)">
  23727. <exception cref="T:System.IO.IOException"/>
  23728. </member>
  23729. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.CheckClientCertificateType(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.CertificateRequest,System.Int16,System.Int16)">
  23730. <exception cref="T:System.IO.IOException"/>
  23731. </member>
  23732. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.CheckExtensionData13(System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int32,System.Int16)">
  23733. <exception cref="T:System.IO.IOException"/>
  23734. </member>
  23735. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.GenerateEncryptedPreMasterSecret(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsEncryptor,System.IO.Stream)">
  23736. <summary>Generate a pre_master_secret and send it encrypted to the server.</summary>
  23737. <exception cref="T:System.IO.IOException"/>
  23738. </member>
  23739. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.AddPreSharedKeyToClientExtensions(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsPsk[],System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  23740. <exception cref="T:System.IO.IOException"/>
  23741. </member>
  23742. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.AddPreSharedKeyToClientHello(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient,System.Collections.Generic.IDictionary{System.Int32,System.Byte[]},System.Int32[])">
  23743. <exception cref="T:System.IO.IOException"/>
  23744. </member>
  23745. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.AddPreSharedKeyToClientHelloRetry(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClientContext,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.OfferedPsks.BindersConfig,System.Collections.Generic.IDictionary{System.Int32,System.Byte[]})">
  23746. <exception cref="T:System.IO.IOException"/>
  23747. </member>
  23748. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsUtilities.GetPskExternalsClient(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsClient,System.Int32[])">
  23749. <exception cref="T:System.IO.IOException"/>
  23750. </member>
  23751. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TrustedAuthority.Encode(System.IO.Stream)">
  23752. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TrustedAuthority"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  23753. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  23754. <exception cref="T:System.IO.IOException"/>
  23755. </member>
  23756. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TrustedAuthority.Parse(System.IO.Stream)">
  23757. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TrustedAuthority"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  23758. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  23759. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TrustedAuthority"/> object.</returns>
  23760. <exception cref="T:System.IO.IOException"/>
  23761. </member>
  23762. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UrlAndHash">
  23763. <summary>RFC 6066 5.</summary>
  23764. </member>
  23765. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UrlAndHash.Encode(System.IO.Stream)">
  23766. <summary>Encode this <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UrlAndHash"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  23767. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  23768. <exception cref="T:System.IO.IOException"/>
  23769. </member>
  23770. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UrlAndHash.Parse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  23771. <summary>Parse a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UrlAndHash"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  23772. <param name="context">the <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  23773. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  23774. <returns>a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UrlAndHash"/> object.</returns>
  23775. <exception cref="T:System.IO.IOException"/>
  23776. </member>
  23777. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UserMappingType">
  23778. <summary>RFC 4681</summary>
  23779. </member>
  23780. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UseSrtpData">
  23781. <summary>RFC 5764 4.1.1</summary>
  23782. </member>
  23783. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UseSrtpData.#ctor(System.Int32[],System.Byte[])">
  23784. <param name="protectionProfiles">see <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SrtpProtectionProfile"/> for valid constants.</param>
  23785. <param name="mki">valid lengths from 0 to 255.</param>
  23786. </member>
  23787. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UseSrtpData.ProtectionProfiles">
  23788. <returns>see <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.SrtpProtectionProfile"/> for valid constants.</returns>
  23789. </member>
  23790. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.UseSrtpData.Mki">
  23791. <returns>valid lengths from 0 to 255.</returns>
  23792. </member>
  23793. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampRequest">
  23794. Base class for an RFC 3161 Time Stamp Request.
  23795. </member>
  23796. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampRequest.#ctor(System.Byte[])">
  23797. Create a TimeStampRequest from the past in byte array.
  23798. @param req byte array containing the request.
  23799. @throws IOException if the request is malformed.
  23800. </member>
  23801. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampRequest.#ctor(System.IO.Stream)">
  23802. Create a TimeStampRequest from the past in input stream.
  23803. @param in input stream containing the request.
  23804. @throws IOException if the request is malformed.
  23805. </member>
  23806. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampRequest.Validate(System.Collections.Generic.IList{System.String},System.Collections.Generic.IList{System.String},System.Collections.Generic.IList{System.String})">
  23807. Validate the timestamp request, checking the digest to see if it is of an
  23808. accepted type and whether it is of the correct length for the algorithm specified.
  23809. @param algorithms a set of string OIDS giving accepted algorithms.
  23810. @param policies if non-null a set of policies we are willing to sign under.
  23811. @param extensions if non-null a set of extensions we are willing to accept.
  23812. @throws TspException if the request is invalid, or processing fails.
  23813. </member>
  23814. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampRequest.GetEncoded">
  23815. return the ASN.1 encoded representation of this object.
  23816. </member>
  23817. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampRequestGenerator">
  23818. Generator for RFC 3161 Time Stamp Request objects.
  23819. </member>
  23820. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampRequestGenerator.AddExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  23821. add a given extension field for the standard extensions tag (tag 3)
  23822. @throws IOException
  23823. </member>
  23824. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampRequestGenerator.AddExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,System.Byte[])">
  23825. add a given extension field for the standard extensions tag
  23826. The value parameter becomes the contents of the octet string associated
  23827. with the extension.
  23828. </member>
  23829. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampResponse">
  23830. Base class for an RFC 3161 Time Stamp Response object.
  23831. </member>
  23832. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampResponse.#ctor(System.Byte[])">
  23833. Create a TimeStampResponse from a byte array containing an ASN.1 encoding.
  23834. @param resp the byte array containing the encoded response.
  23835. @throws TspException if the response is malformed.
  23836. @throws IOException if the byte array doesn't represent an ASN.1 encoding.
  23837. </member>
  23838. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampResponse.#ctor(System.IO.Stream)">
  23839. Create a TimeStampResponse from an input stream containing an ASN.1 encoding.
  23840. @param input the input stream containing the encoded response.
  23841. @throws TspException if the response is malformed.
  23842. @throws IOException if the stream doesn't represent an ASN.1 encoding.
  23843. </member>
  23844. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampResponse.Validate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampRequest)">
  23845. Check this response against to see if it a well formed response for
  23846. the passed in request. Validation will include checking the time stamp
  23847. token if the response status is GRANTED or GRANTED_WITH_MODS.
  23848. @param request the request to be checked against
  23849. @throws TspException if the request can not match this response.
  23850. </member>
  23851. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampResponse.GetEncoded">
  23852. return the ASN.1 encoded representation of this object.
  23853. </member>
  23854. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampResponseGenerator">
  23855. Generator for RFC 3161 Time Stamp Responses.
  23856. </member>
  23857. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampResponseGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampRequest,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.Nullable{System.DateTime})">
  23858. Return an appropriate TimeStampResponse.
  23859. <p>
  23860. If genTime is null a timeNotAvailable error response will be returned.
  23861. @param request the request this response is for.
  23862. @param serialNumber serial number for the response token.
  23863. @param genTime generation time for the response token.
  23864. @param provider provider to use for signature calculation.
  23865. @return
  23866. @throws NoSuchAlgorithmException
  23867. @throws NoSuchProviderException
  23868. @throws TSPException
  23869. </p>
  23870. </member>
  23871. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampResponseGenerator.GenerateFailResponse(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp.PkiStatus,System.Int32,System.String)">
  23872. Generate a TimeStampResponse with chosen status and FailInfoField.
  23873. @param status the PKIStatus to set.
  23874. @param failInfoField the FailInfoField to set.
  23875. @param statusString an optional string describing the failure.
  23876. @return a TimeStampResponse with a failInfoField and optional statusString
  23877. @throws TSPException in case the response could not be created
  23878. </member>
  23879. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampToken.Validate(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  23880. Validate the time stamp token.
  23881. <p>
  23882. To be valid the token must be signed by the passed in certificate and
  23883. the certificate must be the one referred to by the SigningCertificate
  23884. attribute included in the hashed attributes of the token. The
  23885. certificate must also have the ExtendedKeyUsageExtension with only
  23886. KeyPurposeID.IdKPTimeStamping and have been valid at the time the
  23887. timestamp was created.
  23888. </p>
  23889. <p>
  23890. A successful call to validate means all the above are true.
  23891. </p>
  23892. </member>
  23893. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampToken.ToCmsSignedData">
  23894. Return the underlying CmsSignedData object.
  23895. @return the underlying CMS structure.
  23896. </member>
  23897. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampToken.GetEncoded">
  23898. Return a ASN.1 encoded byte stream representing the encoded object.
  23899. @throws IOException if encoding fails.
  23900. </member>
  23901. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampToken.GetEncoded(System.String)">
  23902. return the ASN.1 encoded representation of this object using the specified encoding.
  23903. @param encoding the ASN.1 encoding format to use ("BER" or "DER").
  23904. </member>
  23905. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampTokenGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String,System.String)">
  23906. basic creation - only the default attributes will be included here.
  23907. </member>
  23908. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampTokenGenerator.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,System.String,System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  23909. create with a signer with extra signed/unsigned attributes.
  23910. </member>
  23911. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TimeStampTokenInfo.Nonce">
  23912. @return the nonce value, null if there isn't one.
  23913. </member>
  23914. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TspAlgorithms">
  23915. Recognised hash algorithms for the time stamp protocol.
  23916. </member>
  23917. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TspUtil.GetSignatureTimestamps(Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms.SignerInformation)">
  23918. Fetches the signature time-stamp attributes from a SignerInformation object.
  23919. Checks that the MessageImprint for each time-stamp matches the signature field.
  23920. (see RFC 3161 Appendix A).
  23921. @param signerInfo a SignerInformation to search for time-stamps
  23922. @return a collection of TimeStampToken objects
  23923. @throws TSPValidationException
  23924. </member>
  23925. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TspUtil.ValidateCertificate(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  23926. Validate the passed in certificate as being of the correct type to be used
  23927. for time stamping. To be valid it must have an ExtendedKeyUsage extension
  23928. which has a key purpose identifier of id-kp-timeStamping.
  23929. @param cert the certificate of interest.
  23930. @throws TspValidationException if the certicate fails on one of the check points.
  23931. </member>
  23932. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TspUtil.GetDigestAlgName(System.String)">
  23933. <summary>
  23934. Return the digest algorithm using one of the standard JCA string
  23935. representations rather than the algorithm identifier (if possible).
  23936. </summary>
  23937. </member>
  23938. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TspValidationException">
  23939. Exception thrown if a TSP request or response fails to validate.
  23940. <p>
  23941. If a failure code is associated with the exception it can be retrieved using
  23942. the getFailureCode() method.</p>
  23943. </member>
  23944. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp.TspValidationException.FailureCode">
  23945. <returns>The failure code associated with this exception, if one is set.</returns>
  23946. </member>
  23947. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Arrays">
  23948. <summary> General array utilities.</summary>
  23949. </member>
  23950. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Arrays.AreEqual(System.Byte[],System.Byte[])">
  23951. <summary>
  23952. Are two arrays equal.
  23953. </summary>
  23954. <param name="a">Left side.</param>
  23955. <param name="b">Right side.</param>
  23956. <returns>True if equal.</returns>
  23957. </member>
  23958. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Arrays.ConstantTimeAreEqual(System.Byte[],System.Byte[])">
  23959. <summary>
  23960. A constant time equals comparison - does not terminate early if
  23961. test will fail.
  23962. </summary>
  23963. <param name="a">first array</param>
  23964. <param name="b">second array</param>
  23965. <returns>true if arrays equal, false otherwise.</returns>
  23966. </member>
  23967. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Arrays.CopyOfRange(System.Byte[],System.Int32,System.Int32)">
  23968. Make a copy of a range of bytes from the passed in data array. The range can
  23969. extend beyond the end of the input array, in which case the return array will
  23970. be padded with zeroes.
  23971. @param data the array from which the data is to be copied.
  23972. @param from the start index at which the copying should take place.
  23973. @param to the final index of the range (exclusive).
  23974. @return a new byte array containing the range given.
  23975. </member>
  23976. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.BigIntegers">
  23977. BigInteger utilities.
  23978. </member>
  23979. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.BigIntegers.AsUnsignedByteArray(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  23980. Return the passed in value as an unsigned byte array.
  23981. @param value the value to be converted.
  23982. @return a byte array without a leading zero byte if present in the signed encoding.
  23983. </member>
  23984. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.BigIntegers.AsUnsignedByteArray(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  23985. Return the passed in value as an unsigned byte array of the specified length, padded with
  23986. leading zeros as necessary.
  23987. @param length the fixed length of the result.
  23988. @param n the value to be converted.
  23989. @return a byte array padded to a fixed length with leading zeros.
  23990. </member>
  23991. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.BigIntegers.AsUnsignedByteArray(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.Byte[],System.Int32,System.Int32)">
  23992. Write the passed in value as unsigned bytes to the specified buffer range, padded with
  23993. leading zeros as necessary.
  23994. @param n
  23995. the value to be converted.
  23996. @param buf
  23997. the buffer to which the value is written.
  23998. @param off
  23999. the start offset in array <code>buf</code> at which the data is written.
  24000. @param len
  24001. the fixed length of data written (possibly padded with leading zeros).
  24002. </member>
  24003. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.BigIntegers.CreateRandomBigInteger(System.Int32,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  24004. <summary>
  24005. Creates a Random BigInteger from the secure random of a given bit length.
  24006. </summary>
  24007. <param name="bitLength"></param>
  24008. <param name="secureRandom"></param>
  24009. <returns></returns>
  24010. </member>
  24011. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.BigIntegers.CreateRandomInRange(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.SecureRandom)">
  24012. Return a random BigInteger not less than 'min' and not greater than 'max'
  24013. @param min the least value that may be generated
  24014. @param max the greatest value that may be generated
  24015. @param random the source of randomness
  24016. @return a random BigInteger value in the range [min,max]
  24017. </member>
  24018. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Bzip2.BZip2Constants">
  24019. Base class for both the compress and decompress classes.
  24020. Holds common arrays, and static data.
  24021. @author <a href="mailto:keiron@aftexsw.com">Keiron Liddle</a>
  24022. </member>
  24023. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Bzip2.CBZip2InputStream">
  24024. An input stream that decompresses from the BZip2 format (with the file
  24025. header chars) to be read as any other stream.
  24026. @author <a href="mailto:keiron@aftexsw.com">Keiron Liddle</a>
  24027. <b>NB:</b> note this class has been modified to read the leading BZ from the
  24028. start of the BZIP2 stream to make it compatible with other PGP programs.
  24029. </member>
  24030. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Bzip2.CBZip2OutputStream">
  24031. An output stream that compresses into the BZip2 format (with the file
  24032. header chars) into another stream.
  24033. @author <a href="mailto:keiron@aftexsw.com">Keiron Liddle</a>
  24034. TODO: Update to BZip2 1.0.1
  24035. <b>NB:</b> note this class has been modified to add a leading BZ to the
  24036. start of the BZIP2 stream to make it compatible with other PGP programs.
  24037. </member>
  24038. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Bzip2.CBZip2OutputStream.WriteByte(System.Byte)">
  24039. modified by Oliver Merkel, 010128
  24040. </member>
  24041. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Bzip2.CRC">
  24042. A simple class the hold and calculate the CRC for sanity checking
  24043. of the data.
  24044. @author <a href="mailto:keiron@aftexsw.com">Keiron Liddle</a>
  24045. </member>
  24046. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.ISelector`1">
  24047. <summary>Interface for matching objects in an <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.IStore`1"/>.</summary>
  24048. <typeparam name="T">The contravariant type of selectable objects.</typeparam>
  24049. </member>
  24050. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.ISelector`1.Match(`0)">
  24051. <summary>Match the passed in object, returning true if it would be selected by this selector, false
  24052. otherwise.</summary>
  24053. <param name="candidate">The object to be matched.</param>
  24054. <returns><code>true</code> if the objects is matched by this selector, false otherwise.</returns>
  24055. </member>
  24056. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.IStore`1">
  24057. <summary>A generic interface describing a simple store of objects.</summary>
  24058. <typeparam name="T">The covariant type of stored objects.</typeparam>
  24059. </member>
  24060. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.IStore`1.EnumerateMatches(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.ISelector{`0})">
  24061. <summary>Enumerate the (possibly empty) collection of objects matched by the given selector.</summary>
  24062. <param name="selector">The <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections.ISelector`1"/> used to select matching objects.</param>
  24063. <returns>An <see cref="T:System.Collections.Generic.IEnumerable`1"/> of the matching objects.</returns>
  24064. </member>
  24065. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date.DateTimeUtilities.DateTimeToUnixMs(System.DateTime)">
  24066. <summary>
  24067. Return the number of milliseconds since the Unix epoch (1 Jan., 1970 UTC) for a given DateTime value.
  24068. </summary>
  24069. <remarks>The DateTime value will be converted to UTC (using <see cref="M:System.DateTime.ToUniversalTime"/> before
  24070. conversion.</remarks>
  24071. <param name="dateTime">A DateTime value not before the epoch.</param>
  24072. <returns>Number of whole milliseconds after epoch.</returns>
  24073. <exception cref="T:System.ArgumentOutOfRangeException">'dateTime' is before the epoch.</exception>
  24074. </member>
  24075. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date.DateTimeUtilities.UnixMsToDateTime(System.Int64)">
  24076. <summary>
  24077. Create a UTC DateTime value from the number of milliseconds since the Unix epoch (1 Jan., 1970 UTC).
  24078. </summary>
  24079. <param name="unixMs">Number of milliseconds since the epoch.</param>
  24080. <returns>A UTC DateTime value</returns>
  24081. <exception cref="T:System.ArgumentOutOfRangeException">'unixMs' is before 'MinUnixMs' or after 'MaxUnixMs'.
  24082. </exception>
  24083. </member>
  24084. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date.DateTimeUtilities.CurrentUnixMs">
  24085. <summary>
  24086. Return the current number of milliseconds since the Unix epoch (1 Jan., 1970 UTC).
  24087. </summary>
  24088. </member>
  24089. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Base64.Encode(System.Byte[])">
  24090. encode the input data producing a base 64 encoded byte array.
  24091. @return a byte array containing the base 64 encoded data.
  24092. </member>
  24093. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Base64.Encode(System.Byte[],System.Int32,System.Int32)">
  24094. encode the input data producing a base 64 encoded byte array.
  24095. @return a byte array containing the base 64 encoded data.
  24096. </member>
  24097. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Base64.Encode(System.Byte[],System.IO.Stream)">
  24098. Encode the byte data to base 64 writing it to the given output stream.
  24099. @return the number of bytes produced.
  24100. </member>
  24101. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Base64.Encode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  24102. Encode the byte data to base 64 writing it to the given output stream.
  24103. @return the number of bytes produced.
  24104. </member>
  24105. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Base64.Decode(System.Byte[])">
  24106. decode the base 64 encoded input data. It is assumed the input data is valid.
  24107. @return a byte array representing the decoded data.
  24108. </member>
  24109. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Base64.Decode(System.String)">
  24110. decode the base 64 encoded string data - whitespace will be ignored.
  24111. @return a byte array representing the decoded data.
  24112. </member>
  24113. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Base64.Decode(System.String,System.IO.Stream)">
  24114. decode the base 64 encoded string data writing it to the given output stream,
  24115. whitespace characters will be ignored.
  24116. @return the number of bytes produced.
  24117. </member>
  24118. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Base64Encoder.Encode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  24119. encode the input data producing a base 64 output stream.
  24120. @return the number of bytes produced.
  24121. </member>
  24122. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Base64Encoder.Decode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  24123. decode the base 64 encoded byte data writing it to the given output stream,
  24124. whitespace characters will be ignored.
  24125. @return the number of bytes produced.
  24126. </member>
  24127. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Base64Encoder.DecodeString(System.String,System.IO.Stream)">
  24128. decode the base 64 encoded string data writing it to the given output stream,
  24129. whitespace characters will be ignored.
  24130. @return the number of bytes produced.
  24131. </member>
  24132. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.BufferedDecoder">
  24133. <summary>
  24134. A buffering class to allow translation from one format to another to
  24135. be done in discrete chunks.
  24136. </summary>
  24137. </member>
  24138. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.BufferedDecoder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.ITranslator,System.Int32)">
  24139. <summary>
  24140. Create a buffered Decoder.
  24141. </summary>
  24142. <param name="translator">The translater to use.</param>
  24143. <param name="bufferSize">The size of the buffer.</param>
  24144. </member>
  24145. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.BufferedDecoder.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  24146. <summary>
  24147. Process one byte of data.
  24148. </summary>
  24149. <param name="input">Data in.</param>
  24150. <param name="output">Byte array for the output.</param>
  24151. <param name="outOff">The offset in the output byte array to start writing from.</param>
  24152. <returns>The amount of output bytes.</returns>
  24153. </member>
  24154. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.BufferedDecoder.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  24155. <summary>
  24156. Process data from a byte array.
  24157. </summary>
  24158. <param name="input">The input data.</param>
  24159. <param name="inOff">Start position within input data array.</param>
  24160. <param name="len">Amount of data to process from input data array.</param>
  24161. <param name="outBytes">Array to store output.</param>
  24162. <param name="outOff">Position in output array to start writing from.</param>
  24163. <returns>The amount of output bytes.</returns>
  24164. </member>
  24165. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.BufferedEncoder">
  24166. <summary>
  24167. A class that allows encoding of data using a specific encoder to be processed in chunks.
  24168. </summary>
  24169. </member>
  24170. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.BufferedEncoder.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.ITranslator,System.Int32)">
  24171. <summary>
  24172. Create.
  24173. </summary>
  24174. <param name="translator">The translator to use.</param>
  24175. <param name="bufferSize">Size of the chunks.</param>
  24176. </member>
  24177. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.BufferedEncoder.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  24178. <summary>
  24179. Process one byte of data.
  24180. </summary>
  24181. <param name="input">The byte.</param>
  24182. <param name="outBytes">An array to store output in.</param>
  24183. <param name="outOff">Offset within output array to start writing from.</param>
  24184. <returns></returns>
  24185. </member>
  24186. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.BufferedEncoder.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  24187. <summary>
  24188. Process data from a byte array.
  24189. </summary>
  24190. <param name="input">Input data Byte array containing data to be processed.</param>
  24191. <param name="inOff">Start position within input data array.</param>
  24192. <param name="len">Amount of input data to be processed.</param>
  24193. <param name="outBytes">Output data array.</param>
  24194. <param name="outOff">Offset within output data array to start writing to.</param>
  24195. <returns>The amount of data written.</returns>
  24196. </member>
  24197. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex">
  24198. <summary>
  24199. Class to decode and encode Hex.
  24200. </summary>
  24201. </member>
  24202. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.Encode(System.Byte[])">
  24203. encode the input data producing a Hex encoded byte array.
  24204. @return a byte array containing the Hex encoded data.
  24205. </member>
  24206. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.Encode(System.Byte[],System.Int32,System.Int32)">
  24207. encode the input data producing a Hex encoded byte array.
  24208. @return a byte array containing the Hex encoded data.
  24209. </member>
  24210. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.Encode(System.Byte[],System.IO.Stream)">
  24211. Hex encode the byte data writing it to the given output stream.
  24212. @return the number of bytes produced.
  24213. </member>
  24214. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.Encode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  24215. Hex encode the byte data writing it to the given output stream.
  24216. @return the number of bytes produced.
  24217. </member>
  24218. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.Decode(System.Byte[])">
  24219. decode the Hex encoded input data. It is assumed the input data is valid.
  24220. @return a byte array representing the decoded data.
  24221. </member>
  24222. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.Decode(System.String)">
  24223. decode the Hex encoded string data - whitespace will be ignored.
  24224. @return a byte array representing the decoded data.
  24225. </member>
  24226. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.Decode(System.String,System.IO.Stream)">
  24227. decode the Hex encoded string data writing it to the given output stream,
  24228. whitespace characters will be ignored.
  24229. @return the number of bytes produced.
  24230. </member>
  24231. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.DecodeStrict(System.String)">
  24232. Decode the hexadecimal-encoded string strictly i.e. any non-hexadecimal characters will be
  24233. considered an error.
  24234. @return a byte array representing the decoded data.
  24235. </member>
  24236. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.DecodeStrict(System.String,System.Int32,System.Int32)">
  24237. Decode the hexadecimal-encoded string strictly i.e. any non-hexadecimal characters will be
  24238. considered an error.
  24239. @return a byte array representing the decoded data.
  24240. </member>
  24241. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.HexEncoder.Encode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  24242. encode the input data producing a Hex output stream.
  24243. @return the number of bytes produced.
  24244. </member>
  24245. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.HexEncoder.Decode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  24246. decode the Hex encoded byte data writing it to the given output stream,
  24247. whitespace characters will be ignored.
  24248. @return the number of bytes produced.
  24249. </member>
  24250. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.HexEncoder.DecodeString(System.String,System.IO.Stream)">
  24251. decode the Hex encoded string data writing it to the given output stream,
  24252. whitespace characters will be ignored.
  24253. @return the number of bytes produced.
  24254. </member>
  24255. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.HexTranslator">
  24256. <summary>
  24257. A hex translator.
  24258. </summary>
  24259. </member>
  24260. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.HexTranslator.GetEncodedBlockSize">
  24261. <summary>
  24262. Return encoded block size.
  24263. </summary>
  24264. <returns>2</returns>
  24265. </member>
  24266. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.HexTranslator.Encode(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  24267. <summary>
  24268. Encode some data.
  24269. </summary>
  24270. <param name="input">Input data array.</param>
  24271. <param name="inOff">Start position within input data array.</param>
  24272. <param name="length">The amount of data to process.</param>
  24273. <param name="outBytes">The output data array.</param>
  24274. <param name="outOff">The offset within the output data array to start writing from.</param>
  24275. <returns>Amount of data encoded.</returns>
  24276. </member>
  24277. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.HexTranslator.GetDecodedBlockSize">
  24278. <summary>
  24279. Returns the decoded block size.
  24280. </summary>
  24281. <returns>1</returns>
  24282. </member>
  24283. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.HexTranslator.Decode(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  24284. <summary>
  24285. Decode data from a byte array.
  24286. </summary>
  24287. <param name="input">The input data array.</param>
  24288. <param name="inOff">Start position within input data array.</param>
  24289. <param name="length">The amounty of data to process.</param>
  24290. <param name="outBytes">The output data array.</param>
  24291. <param name="outOff">The position within the output data array to start writing from.</param>
  24292. <returns>The amount of data written.</returns>
  24293. </member>
  24294. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.IEncoder">
  24295. Encode and decode byte arrays (typically from binary to 7-bit ASCII
  24296. encodings).
  24297. </member>
  24298. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.ITranslator">
  24299. <summary>
  24300. Translator interface.
  24301. </summary>
  24302. </member>
  24303. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.UrlBase64">
  24304. Convert binary data to and from UrlBase64 encoding. This is identical to
  24305. Base64 encoding, except that the padding character is "." and the other
  24306. non-alphanumeric characters are "-" and "_" instead of "+" and "/".
  24307. <p>
  24308. The purpose of UrlBase64 encoding is to provide a compact encoding of binary
  24309. data that is safe for use as an URL parameter. Base64 encoding does not
  24310. produce encoded values that are safe for use in URLs, since "/" can be
  24311. interpreted as a path delimiter; "+" is the encoded form of a space; and
  24312. "=" is used to separate a name from the corresponding value in an URL
  24313. parameter.
  24314. </p>
  24315. </member>
  24316. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.UrlBase64.Encode(System.Byte[])">
  24317. Encode the input data producing a URL safe base 64 encoded byte array.
  24318. @return a byte array containing the URL safe base 64 encoded data.
  24319. </member>
  24320. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.UrlBase64.Encode(System.Byte[],System.IO.Stream)">
  24321. Encode the byte data writing it to the given output stream.
  24322. @return the number of bytes produced.
  24323. </member>
  24324. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.UrlBase64.Decode(System.Byte[])">
  24325. Decode the URL safe base 64 encoded input data - white space will be ignored.
  24326. @return a byte array representing the decoded data.
  24327. </member>
  24328. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.UrlBase64.Decode(System.Byte[],System.IO.Stream)">
  24329. decode the URL safe base 64 encoded byte data writing it to the given output stream,
  24330. whitespace characters will be ignored.
  24331. @return the number of bytes produced.
  24332. </member>
  24333. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.UrlBase64.Decode(System.String)">
  24334. decode the URL safe base 64 encoded string data - whitespace will be ignored.
  24335. @return a byte array representing the decoded data.
  24336. </member>
  24337. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.UrlBase64.Decode(System.String,System.IO.Stream)">
  24338. Decode the URL safe base 64 encoded string data writing it to the given output stream,
  24339. whitespace characters will be ignored.
  24340. @return the number of bytes produced.
  24341. </member>
  24342. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.UrlBase64Encoder">
  24343. Convert binary data to and from UrlBase64 encoding. This is identical to
  24344. Base64 encoding, except that the padding character is "." and the other
  24345. non-alphanumeric characters are "-" and "_" instead of "+" and "/".
  24346. <p>
  24347. The purpose of UrlBase64 encoding is to provide a compact encoding of binary
  24348. data that is safe for use as an URL parameter. Base64 encoding does not
  24349. produce encoded values that are safe for use in URLs, since "/" can be
  24350. interpreted as a path delimiter; "+" is the encoded form of a space; and
  24351. "=" is used to separate a name from the corresponding value in an URL
  24352. parameter.
  24353. </p>
  24354. </member>
  24355. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IEncodable.GetEncoded">
  24356. <summary>Return a byte array representing the implementing object.</summary>
  24357. <returns>An encoding of this object as a byte array.</returns>
  24358. <exception cref="T:System.IO.IOException"/>
  24359. </member>
  24360. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IMemoable.Copy">
  24361. <summary>
  24362. Produce a copy of this object with its configuration and in its current state.
  24363. </summary>
  24364. <remarks>
  24365. The returned object may be used simply to store the state, or may be used as a similar object
  24366. starting from the copied state.
  24367. </remarks>
  24368. </member>
  24369. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IMemoable.Reset(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IMemoable)">
  24370. <summary>
  24371. Restore a copied object state into this object.
  24372. </summary>
  24373. <remarks>
  24374. Implementations of this method <em>should</em> try to avoid or minimise memory allocation to perform the reset.
  24375. </remarks>
  24376. <param name="other">an object originally {@link #copy() copied} from an object of the same type as this instance.</param>
  24377. <exception cref="T:System.InvalidCastException">if the provided object is not of the correct type.</exception>
  24378. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.MemoableResetException">if the <b>other</b> parameter is in some other way invalid.</exception>
  24379. </member>
  24380. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObjectGenerator.Generate">
  24381. <returns>
  24382. A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObject"/>
  24383. </returns>
  24384. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemGenerationException"></exception>
  24385. </member>
  24386. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObjectParser.ParseObject(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  24387. <param name="obj">
  24388. A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObject"/>
  24389. </param>
  24390. <returns>
  24391. An <see cref="T:System.Object"/>
  24392. </returns>
  24393. <exception cref="T:System.IO.IOException"></exception>
  24394. </member>
  24395. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemReader.ReadPemObject">
  24396. <returns>
  24397. A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObject"/>
  24398. </returns>
  24399. <exception cref="T:System.IO.IOException"></exception>
  24400. </member>
  24401. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemReader.seekColon(System.Int32)">
  24402. <summary>
  24403. Seek ':" up to the limit.
  24404. </summary>
  24405. <param name="upTo"></param>
  24406. <returns></returns>
  24407. </member>
  24408. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemReader.consumeDash">
  24409. <summary>
  24410. Consume the dashes
  24411. </summary>
  24412. <returns></returns>
  24413. </member>
  24414. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemReader.skipWhiteSpace">
  24415. <summary>
  24416. Skip white space leave char in stream.
  24417. </summary>
  24418. </member>
  24419. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemReader.expect(System.String)">
  24420. <summary>
  24421. Read forward consuming the expected string.
  24422. </summary>
  24423. <param name="value">expected string</param>
  24424. <returns>false if not consumed</returns>
  24425. </member>
  24426. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemReader.bufferUntilStopChar(System.Char,System.Boolean)">
  24427. <summary>
  24428. Consume until dash.
  24429. </summary>
  24430. <returns>true if stream end not met</returns>
  24431. </member>
  24432. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemWriter">
  24433. A generic PEM writer, based on RFC 1421
  24434. </member>
  24435. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemWriter.#ctor(System.IO.TextWriter)">
  24436. Base constructor.
  24437. @param out output stream to use.
  24438. </member>
  24439. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemWriter.GetOutputSize(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  24440. Return the number of bytes or characters required to contain the
  24441. passed in object if it is PEM encoded.
  24442. @param obj pem object to be output
  24443. @return an estimate of the number of bytes
  24444. </member>
  24445. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Streams.PipeAll(System.IO.Stream,System.IO.Stream)">
  24446. <summary>Write the full contents of inStr to the destination stream outStr.</summary>
  24447. <param name="inStr">Source stream.</param>
  24448. <param name="outStr">Destination stream.</param>
  24449. <exception cref="T:System.IO.IOException">In case of IO failure.</exception>
  24450. </member>
  24451. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Streams.PipeAll(System.IO.Stream,System.IO.Stream,System.Int32)">
  24452. <summary>Write the full contents of inStr to the destination stream outStr.</summary>
  24453. <param name="inStr">Source stream.</param>
  24454. <param name="outStr">Destination stream.</param>
  24455. <param name="bufferSize">The size of temporary buffer to use.</param>
  24456. <exception cref="T:System.IO.IOException">In case of IO failure.</exception>
  24457. </member>
  24458. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Streams.PipeAllLimited(System.IO.Stream,System.Int64,System.IO.Stream)">
  24459. <summary>
  24460. Pipe all bytes from <c>inStr</c> to <c>outStr</c>, throwing <c>StreamFlowException</c> if greater
  24461. than <c>limit</c> bytes in <c>inStr</c>.
  24462. </summary>
  24463. <param name="inStr">
  24464. A <see cref="T:System.IO.Stream"/>
  24465. </param>
  24466. <param name="limit">
  24467. A <see cref="T:System.Int64"/>
  24468. </param>
  24469. <param name="outStr">
  24470. A <see cref="T:System.IO.Stream"/>
  24471. </param>
  24472. <returns>The number of bytes actually transferred, if not greater than <c>limit</c></returns>
  24473. <exception cref="T:System.IO.IOException"></exception>
  24474. </member>
  24475. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Streams.WriteBufTo(System.IO.MemoryStream,System.Byte[],System.Int32)">
  24476. <exception cref="T:System.IO.IOException"></exception>
  24477. </member>
  24478. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.MemoableResetException">
  24479. Exception to be thrown on a failure to reset an object implementing Memoable.
  24480. <p>
  24481. The exception extends InvalidCastException to enable users to have a single handling case,
  24482. only introducing specific handling of this one if required.
  24483. </p>
  24484. </member>
  24485. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Net.IPAddress.IsValid(System.String)">
  24486. Validate the given IPv4 or IPv6 address.
  24487. @param address the IP address as a string.
  24488. @return true if a valid address, false otherwise
  24489. </member>
  24490. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Net.IPAddress.IsValidWithNetMask(System.String)">
  24491. Validate the given IPv4 or IPv6 address and netmask.
  24492. @param address the IP address as a string.
  24493. @return true if a valid address with netmask, false otherwise
  24494. </member>
  24495. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Net.IPAddress.IsValidIPv4(System.String)">
  24496. Validate the given IPv4 address.
  24497. @param address the IP address as a string.
  24498. @return true if a valid IPv4 address, false otherwise
  24499. </member>
  24500. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Net.IPAddress.IsValidIPv6(System.String)">
  24501. Validate the given IPv6 address.
  24502. @param address the IP address as a string.
  24503. @return true if a valid IPv4 address, false otherwise
  24504. </member>
  24505. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Strings">
  24506. <summary> General string utilities.</summary>
  24507. </member>
  24508. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateHolder">
  24509. <remarks>
  24510. The Holder object.
  24511. <pre>
  24512. Holder ::= SEQUENCE {
  24513. baseCertificateID [0] IssuerSerial OPTIONAL,
  24514. -- the issuer and serial number of
  24515. -- the holder's Public Key Certificate
  24516. entityName [1] GeneralNames OPTIONAL,
  24517. -- the name of the claimant or role
  24518. objectDigestInfo [2] ObjectDigestInfo OPTIONAL
  24519. -- used to directly authenticate the holder,
  24520. -- for example, an executable
  24521. }
  24522. </pre>
  24523. </remarks>
  24524. </member>
  24525. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateHolder.#ctor(System.Int32,System.String,System.String,System.Byte[])">
  24526. Constructs a holder for v2 attribute certificates with a hash value for
  24527. some type of object.
  24528. <p>
  24529. <code>digestedObjectType</code> can be one of the following:
  24530. <ul>
  24531. <li>0 - publicKey - A hash of the public key of the holder must be
  24532. passed.</li>
  24533. <li>1 - publicKeyCert - A hash of the public key certificate of the
  24534. holder must be passed.</li>
  24535. <li>2 - otherObjectDigest - A hash of some other object type must be
  24536. passed. <code>otherObjectTypeID</code> must not be empty.</li>
  24537. </ul>
  24538. </p>
  24539. <p>This cannot be used if a v1 attribute certificate is used.</p>
  24540. @param digestedObjectType The digest object type.
  24541. @param digestAlgorithm The algorithm identifier for the hash.
  24542. @param otherObjectTypeID The object type ID if
  24543. <code>digestedObjectType</code> is
  24544. <code>otherObjectDigest</code>.
  24545. @param objectDigest The hash value.
  24546. </member>
  24547. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateHolder.DigestedObjectType">
  24548. Returns the digest object type if an object digest info is used.
  24549. <p>
  24550. <ul>
  24551. <li>0 - publicKey - A hash of the public key of the holder must be
  24552. passed.</li>
  24553. <li>1 - publicKeyCert - A hash of the public key certificate of the
  24554. holder must be passed.</li>
  24555. <li>2 - otherObjectDigest - A hash of some other object type must be
  24556. passed. <code>otherObjectTypeID</code> must not be empty.</li>
  24557. </ul>
  24558. </p>
  24559. @return The digest object type or -1 if no object digest info is set.
  24560. </member>
  24561. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateHolder.DigestAlgorithm">
  24562. Returns the other object type ID if an object digest info is used.
  24563. @return The other object type ID or <code>null</code> if no object
  24564. digest info is set.
  24565. </member>
  24566. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateHolder.GetObjectDigest">
  24567. Returns the hash if an object digest info is used.
  24568. @return The hash or <code>null</code> if no object digest info is set.
  24569. </member>
  24570. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateHolder.OtherObjectTypeID">
  24571. Returns the digest algorithm ID if an object digest info is used.
  24572. @return The digest algorithm ID or <code>null</code> if no object
  24573. digest info is set.
  24574. </member>
  24575. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateHolder.GetEntityNames">
  24576. Return any principal objects inside the attribute certificate holder entity names field.
  24577. @return an array of IPrincipal objects (usually X509Name), null if no entity names field is set.
  24578. </member>
  24579. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateHolder.GetIssuer">
  24580. Return the principals associated with the issuer attached to this holder
  24581. @return an array of principals, null if no BaseCertificateID is set.
  24582. </member>
  24583. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateHolder.SerialNumber">
  24584. Return the serial number associated with the issuer attached to this holder.
  24585. @return the certificate serial number, null if no BaseCertificateID is set.
  24586. </member>
  24587. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateIssuer">
  24588. Carrying class for an attribute certificate issuer.
  24589. </member>
  24590. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateIssuer.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.AttCertIssuer)">
  24591. Set the issuer directly with the ASN.1 structure.
  24592. @param issuer The issuer
  24593. </member>
  24594. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateIssuer.GetPrincipals">
  24595. <summary>Return any principal objects inside the attribute certificate issuer object.</summary>
  24596. <returns>An array of IPrincipal objects (usually X509Principal).</returns>
  24597. </member>
  24598. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension.AuthorityKeyIdentifierStructure">
  24599. <remarks>A high level authority key identifier.</remarks>
  24600. </member>
  24601. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension.AuthorityKeyIdentifierStructure.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1OctetString)">
  24602. Constructor which will take the byte[] returned from getExtensionValue()
  24603. @param encodedValue a DER octet encoded string with the extension structure in it.
  24604. @throws IOException on parsing errors.
  24605. </member>
  24606. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension.AuthorityKeyIdentifierStructure.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  24607. Create an AuthorityKeyIdentifier using the passed in certificate's public
  24608. key, issuer and serial number.
  24609. @param certificate the certificate providing the information.
  24610. @throws CertificateParsingException if there is a problem processing the certificate
  24611. </member>
  24612. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension.AuthorityKeyIdentifierStructure.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  24613. Create an AuthorityKeyIdentifier using just the hash of the
  24614. public key.
  24615. @param pubKey the key to generate the hash from.
  24616. @throws InvalidKeyException if there is a problem using the key.
  24617. </member>
  24618. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension.SubjectKeyIdentifierStructure">
  24619. A high level subject key identifier.
  24620. </member>
  24621. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension.SubjectKeyIdentifierStructure.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1OctetString)">
  24622. Constructor which will take the byte[] returned from getExtensionValue()
  24623. @param encodedValue a DER octet encoded string with the extension structure in it.
  24624. @throws IOException on parsing errors.
  24625. </member>
  24626. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension.X509ExtensionUtilities.FromExtensionValue(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.IX509Extension,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  24627. <summary>
  24628. Extract the value of the given extension, if it exists.
  24629. </summary>
  24630. <param name="extensions">The extensions object.</param>
  24631. <param name="oid">The object identifier to obtain.</param>
  24632. <returns>Asn1Object</returns>
  24633. <exception cref="T:System.Exception">if the extension cannot be read.</exception>
  24634. </member>
  24635. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.IX509Extension.GetCriticalExtensionOids">
  24636. <summary>
  24637. Get all critical extension values, by oid
  24638. </summary>
  24639. <returns>IDictionary with string (OID) keys and Asn1OctetString values</returns>
  24640. </member>
  24641. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.IX509Extension.GetNonCriticalExtensionOids">
  24642. <summary>
  24643. Get all non-critical extension values, by oid
  24644. </summary>
  24645. <returns>IDictionary with string (OID) keys and Asn1OctetString values</returns>
  24646. </member>
  24647. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.PrincipalUtilities">
  24648. <remarks>
  24649. A utility class that will extract X509Principal objects from X.509 certificates.
  24650. <p>
  24651. Use this in preference to trying to recreate a principal from a string, not all
  24652. DNs are what they should be, so it's best to leave them encoded where they
  24653. can be.</p>
  24654. </remarks>
  24655. </member>
  24656. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.PrincipalUtilities.GetIssuerX509Principal(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  24657. <summary>Return the issuer of the given cert as an X509Principal.</summary>
  24658. </member>
  24659. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.PrincipalUtilities.GetSubjectX509Principal(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  24660. <summary>Return the subject of the given cert as an X509Principal.</summary>
  24661. </member>
  24662. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.PrincipalUtilities.GetIssuerX509Principal(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl)">
  24663. <summary>Return the issuer of the given CRL as an X509Principal.</summary>
  24664. </member>
  24665. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector">
  24666. This class is an <code>Selector</code> like implementation to select
  24667. attribute certificates from a given set of criteria.
  24668. @see org.bouncycastle.x509.X509AttributeCertificate
  24669. @see org.bouncycastle.x509.X509Store
  24670. </member>
  24671. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.Match(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificate)">
  24672. <summary>
  24673. Decides if the given attribute certificate should be selected.
  24674. </summary>
  24675. <param name="attrCert">The attribute certificate to be checked.</param>
  24676. <returns><code>true</code> if the object matches this selector.</returns>
  24677. </member>
  24678. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AttributeCert">
  24679. <summary>The attribute certificate which must be matched.</summary>
  24680. <remarks>If <c>null</c> is given, any will do.</remarks>
  24681. </member>
  24682. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AttributeCertificateValid">
  24683. <summary>The criteria for validity</summary>
  24684. <remarks>If <c>null</c> is given any will do.</remarks>
  24685. </member>
  24686. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.Holder">
  24687. <summary>The holder.</summary>
  24688. <remarks>If <c>null</c> is given any will do.</remarks>
  24689. </member>
  24690. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.Issuer">
  24691. <summary>The issuer.</summary>
  24692. <remarks>If <c>null</c> is given any will do.</remarks>
  24693. </member>
  24694. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.SerialNumber">
  24695. <summary>The serial number.</summary>
  24696. <remarks>If <c>null</c> is given any will do.</remarks>
  24697. </member>
  24698. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AddTargetName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  24699. Adds a target name criterion for the attribute certificate to the target
  24700. information extension criteria. The <code>X509AttributeCertificate</code>
  24701. must contain at least one of the specified target names.
  24702. <p>
  24703. Each attribute certificate may contain a target information extension
  24704. limiting the servers where this attribute certificate can be used. If
  24705. this extension is not present, the attribute certificate is not targeted
  24706. and may be accepted by any server.
  24707. </p>
  24708. @param name The name as a GeneralName (not <code>null</code>)
  24709. </member>
  24710. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AddTargetName(System.Byte[])">
  24711. Adds a target name criterion for the attribute certificate to the target
  24712. information extension criteria. The <code>X509AttributeCertificate</code>
  24713. must contain at least one of the specified target names.
  24714. <p>
  24715. Each attribute certificate may contain a target information extension
  24716. limiting the servers where this attribute certificate can be used. If
  24717. this extension is not present, the attribute certificate is not targeted
  24718. and may be accepted by any server.
  24719. </p>
  24720. @param name a byte array containing the name in ASN.1 DER encoded form of a GeneralName
  24721. @throws IOException if a parsing error occurs.
  24722. </member>
  24723. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.SetTargetNames(System.Collections.Generic.IEnumerable{System.Object})">
  24724. Adds a collection with target names criteria. If <code>null</code> is
  24725. given any will do.
  24726. <p>
  24727. The collection consists of either GeneralName objects or byte[] arrays representing
  24728. DER encoded GeneralName structures.
  24729. </p>
  24730. @param names A collection of target names.
  24731. @throws IOException if a parsing error occurs.
  24732. @see #AddTargetName(byte[])
  24733. @see #AddTargetName(GeneralName)
  24734. </member>
  24735. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.GetTargetNames">
  24736. Gets the target names. The collection consists of <code>List</code>s
  24737. made up of an <code>Integer</code> in the first entry and a DER encoded
  24738. byte array or a <code>String</code> in the second entry.
  24739. <p>The returned collection is immutable.</p>
  24740. @return The collection of target names
  24741. @see #setTargetNames(Collection)
  24742. </member>
  24743. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AddTargetGroup(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.GeneralName)">
  24744. Adds a target group criterion for the attribute certificate to the target
  24745. information extension criteria. The <code>X509AttributeCertificate</code>
  24746. must contain at least one of the specified target groups.
  24747. <p>
  24748. Each attribute certificate may contain a target information extension
  24749. limiting the servers where this attribute certificate can be used. If
  24750. this extension is not present, the attribute certificate is not targeted
  24751. and may be accepted by any server.
  24752. </p>
  24753. @param group The group as GeneralName form (not <code>null</code>)
  24754. </member>
  24755. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AddTargetGroup(System.Byte[])">
  24756. Adds a target group criterion for the attribute certificate to the target
  24757. information extension criteria. The <code>X509AttributeCertificate</code>
  24758. must contain at least one of the specified target groups.
  24759. <p>
  24760. Each attribute certificate may contain a target information extension
  24761. limiting the servers where this attribute certificate can be used. If
  24762. this extension is not present, the attribute certificate is not targeted
  24763. and may be accepted by any server.
  24764. </p>
  24765. @param name a byte array containing the group in ASN.1 DER encoded form of a GeneralName
  24766. @throws IOException if a parsing error occurs.
  24767. </member>
  24768. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.SetTargetGroups(System.Collections.Generic.IEnumerable{System.Object})">
  24769. Adds a collection with target groups criteria. If <code>null</code> is
  24770. given any will do.
  24771. <p>
  24772. The collection consists of <code>GeneralName</code> objects or <code>byte[]</code>
  24773. representing DER encoded GeneralNames.
  24774. </p>
  24775. @param names A collection of target groups.
  24776. @throws IOException if a parsing error occurs.
  24777. @see #AddTargetGroup(byte[])
  24778. @see #AddTargetGroup(GeneralName)
  24779. </member>
  24780. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.GetTargetGroups">
  24781. Gets the target groups. The collection consists of <code>List</code>s
  24782. made up of an <code>Integer</code> in the first entry and a DER encoded
  24783. byte array or a <code>String</code> in the second entry.
  24784. <p>The returned collection is immutable.</p>
  24785. @return The collection of target groups.
  24786. @see #setTargetGroups(Collection)
  24787. </member>
  24788. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CertPairStoreSelector">
  24789. <remarks>
  24790. This class is an <code>IX509Selector</code> implementation to select
  24791. certificate pairs, which are e.g. used for cross certificates. The set of
  24792. criteria is given from two <code>X509CertStoreSelector</code> objects,
  24793. each of which, if present, must match the respective component of a pair.
  24794. </remarks>
  24795. </member>
  24796. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CertPairStoreSelector.CertPair">
  24797. <summary>The certificate pair which is used for testing on equality.</summary>
  24798. </member>
  24799. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CertPairStoreSelector.ForwardSelector">
  24800. <summary>The certificate selector for the forward part.</summary>
  24801. </member>
  24802. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CertPairStoreSelector.ReverseSelector">
  24803. <summary>The certificate selector for the reverse part.</summary>
  24804. </member>
  24805. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CertPairStoreSelector.Match(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertificatePair)">
  24806. <summary>
  24807. Decides if the given certificate pair should be selected. If
  24808. <c>obj</c> is not a <code>X509CertificatePair</code>, this method
  24809. returns <code>false</code>.
  24810. </summary>
  24811. <param name="pair">The <code>X509CertificatePair</code> to be tested.</param>
  24812. <returns><code>true</code> if the object matches this selector.</returns>
  24813. </member>
  24814. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CertStoreSelector.Policy">
  24815. <summary>
  24816. An <code>ISet</code> of <code>DerObjectIdentifier</code> objects.
  24817. </summary>
  24818. </member>
  24819. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CrlStoreSelector.Issuers">
  24820. <summary>
  24821. An <code>ICollection</code> of <code>X509Name</code> objects
  24822. </summary>
  24823. </member>
  24824. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CrlStoreSelector.AttrCertChecking">
  24825. The attribute certificate being checked. This is not a criterion.
  24826. Rather, it is optional information that may help a {@link X509Store} find
  24827. CRLs that would be relevant when checking revocation for the specified
  24828. attribute certificate. If <code>null</code> is specified, then no such
  24829. optional information is provided.
  24830. @param attrCert the <code>IX509AttributeCertificate</code> being checked (or
  24831. <code>null</code>)
  24832. @see #getAttrCertificateChecking()
  24833. </member>
  24834. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CrlStoreSelector.CompleteCrlEnabled">
  24835. If <code>true</code> only complete CRLs are returned. Defaults to
  24836. <code>false</code>.
  24837. @return <code>true</code> if only complete CRLs are returned.
  24838. </member>
  24839. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CrlStoreSelector.DeltaCrlIndicatorEnabled">
  24840. Returns if this selector must match CRLs with the delta CRL indicator
  24841. extension set. Defaults to <code>false</code>.
  24842. @return Returns <code>true</code> if only CRLs with the delta CRL
  24843. indicator extension are selected.
  24844. </member>
  24845. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CrlStoreSelector.IssuingDistributionPoint">
  24846. The issuing distribution point.
  24847. <p>
  24848. The issuing distribution point extension is a CRL extension which
  24849. identifies the scope and the distribution point of a CRL. The scope
  24850. contains among others information about revocation reasons contained in
  24851. the CRL. Delta CRLs and complete CRLs must have matching issuing
  24852. distribution points.</p>
  24853. <p>
  24854. The byte array is cloned to protect against subsequent modifications.</p>
  24855. <p>
  24856. You must also enable or disable this criteria with
  24857. {@link #setIssuingDistributionPointEnabled(bool)}.</p>
  24858. @param issuingDistributionPoint The issuing distribution point to set.
  24859. This is the DER encoded OCTET STRING extension value.
  24860. @see #getIssuingDistributionPoint()
  24861. </member>
  24862. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CrlStoreSelector.IssuingDistributionPointEnabled">
  24863. Whether the issuing distribution point criteria should be applied.
  24864. Defaults to <code>false</code>.
  24865. <p>
  24866. You may also set the issuing distribution point criteria if not a missing
  24867. issuing distribution point should be assumed.</p>
  24868. @return Returns if the issuing distribution point check is enabled.
  24869. </member>
  24870. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store.X509CrlStoreSelector.MaxBaseCrlNumber">
  24871. The maximum base CRL number. Defaults to <code>null</code>.
  24872. @return Returns the maximum base CRL number.
  24873. @see #setMaxBaseCRLNumber(BigInteger)
  24874. </member>
  24875. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.SubjectPublicKeyInfoFactory">
  24876. <summary>
  24877. A factory to produce Public Key Info Objects.
  24878. </summary>
  24879. </member>
  24880. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  24881. <summary>
  24882. Create a Subject Public Key Info object for a given public key.
  24883. </summary>
  24884. <param name="publicKey">One of ElGammalPublicKeyParameters, DSAPublicKeyParameter, DHPublicKeyParameters, RsaKeyParameters or ECPublicKeyParameters</param>
  24885. <returns>A subject public key info object.</returns>
  24886. <exception cref="T:System.Exception">Throw exception if object provided is not one of the above.</exception>
  24887. </member>
  24888. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509AttrCertParser.ReadAttrCert(System.Byte[])">
  24889. <summary>
  24890. Create loading data from byte array.
  24891. </summary>
  24892. <param name="input"></param>
  24893. </member>
  24894. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509AttrCertParser.ReadAttrCerts(System.Byte[])">
  24895. <summary>
  24896. Create loading data from byte array.
  24897. </summary>
  24898. <param name="input"></param>
  24899. </member>
  24900. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509AttrCertParser.ReadAttrCert(System.IO.Stream)">
  24901. Generates a certificate object and initializes it with the data
  24902. read from the input stream inStream.
  24903. </member>
  24904. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509AttrCertParser.ReadAttrCerts(System.IO.Stream)">
  24905. Returns a (possibly empty) collection view of the certificates
  24906. read from the given input stream inStream.
  24907. </member>
  24908. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Attribute">
  24909. Class for carrying the values in an X.509 Attribute.
  24910. </member>
  24911. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Attribute.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  24912. @param at an object representing an attribute.
  24913. </member>
  24914. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Attribute.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  24915. Create an X.509 Attribute with the type given by the passed in oid and
  24916. the value represented by an ASN.1 Set containing value.
  24917. @param oid type of the attribute
  24918. @param value value object to go into the atribute's value set.
  24919. </member>
  24920. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Attribute.#ctor(System.String,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  24921. Create an X.59 Attribute with the type given by the passed in oid and the
  24922. value represented by an ASN.1 Set containing the objects in value.
  24923. @param oid type of the attribute
  24924. @param value vector of values to go in the attribute's value set.
  24925. </member>
  24926. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate">
  24927. <summary>
  24928. An Object representing an X509 Certificate.
  24929. Has static methods for loading Certificates encoded in many forms that return X509Certificate Objects.
  24930. </summary>
  24931. </member>
  24932. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.IsValidNow">
  24933. <summary>
  24934. Return true if the current time is within the start and end times nominated on the certificate.
  24935. </summary>
  24936. <returns>true id certificate is valid for the current time.</returns>
  24937. </member>
  24938. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.IsValid(System.DateTime)">
  24939. <summary>
  24940. Return true if the nominated time is within the start and end times nominated on the certificate.
  24941. </summary>
  24942. <param name="time">The time to test validity against.</param>
  24943. <returns>True if certificate is valid for nominated time.</returns>
  24944. </member>
  24945. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.CheckValidity">
  24946. <summary>
  24947. Checks if the current date is within certificate's validity period.
  24948. </summary>
  24949. </member>
  24950. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.CheckValidity(System.DateTime)">
  24951. <summary>
  24952. Checks if the given date is within certificate's validity period.
  24953. </summary>
  24954. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates.CertificateExpiredException">if the certificate is expired by given date</exception>
  24955. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates.CertificateNotYetValidException">if the certificate is not yet valid on given date</exception>
  24956. </member>
  24957. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.Version">
  24958. <summary>
  24959. Return the certificate's version.
  24960. </summary>
  24961. <returns>An integer whose value Equals the version of the cerficate.</returns>
  24962. </member>
  24963. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.SerialNumber">
  24964. <summary>
  24965. Return a <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger">BigInteger</see> containing the serial number.
  24966. </summary>
  24967. <returns>The Serial number.</returns>
  24968. </member>
  24969. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.IssuerDN">
  24970. <summary>
  24971. Get the Issuer Distinguished Name. (Who signed the certificate.)
  24972. </summary>
  24973. <returns>And X509Object containing name and value pairs.</returns>
  24974. </member>
  24975. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.SubjectDN">
  24976. <summary>
  24977. Get the subject of this certificate.
  24978. </summary>
  24979. <returns>An X509Name object containing name and value pairs.</returns>
  24980. </member>
  24981. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.NotBefore">
  24982. <summary>
  24983. The time that this certificate is valid from.
  24984. </summary>
  24985. <returns>A DateTime object representing that time in the local time zone.</returns>
  24986. </member>
  24987. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.NotAfter">
  24988. <summary>
  24989. The time that this certificate is valid up to.
  24990. </summary>
  24991. <returns>A DateTime object representing that time in the local time zone.</returns>
  24992. </member>
  24993. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.GetTbsCertificate">
  24994. <summary>
  24995. Return the Der encoded TbsCertificate data.
  24996. This is the certificate component less the signature.
  24997. To Get the whole certificate call the GetEncoded() member.
  24998. </summary>
  24999. <returns>A byte array containing the Der encoded Certificate component.</returns>
  25000. </member>
  25001. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.GetSignature">
  25002. <summary>
  25003. The signature.
  25004. </summary>
  25005. <returns>A byte array containg the signature of the certificate.</returns>
  25006. </member>
  25007. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.SigAlgName">
  25008. <summary>
  25009. A meaningful version of the Signature Algorithm. (EG SHA1WITHRSA)
  25010. </summary>
  25011. <returns>A sting representing the signature algorithm.</returns>
  25012. </member>
  25013. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.SigAlgOid">
  25014. <summary>
  25015. Get the Signature Algorithms Object ID.
  25016. </summary>
  25017. <returns>A string containg a '.' separated object id.</returns>
  25018. </member>
  25019. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.GetSigAlgParams">
  25020. <summary>
  25021. Get the signature algorithms parameters. (EG DSA Parameters)
  25022. </summary>
  25023. <returns>A byte array containing the Der encoded version of the parameters or null if there are none.</returns>
  25024. </member>
  25025. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.IssuerUniqueID">
  25026. <summary>
  25027. Get the issuers UID.
  25028. </summary>
  25029. <returns>A DerBitString.</returns>
  25030. </member>
  25031. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.SubjectUniqueID">
  25032. <summary>
  25033. Get the subjects UID.
  25034. </summary>
  25035. <returns>A DerBitString.</returns>
  25036. </member>
  25037. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.GetKeyUsage">
  25038. <summary>
  25039. Get a key usage guidlines.
  25040. </summary>
  25041. </member>
  25042. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.GetPublicKey">
  25043. <summary>
  25044. Get the public key of the subject of the certificate.
  25045. </summary>
  25046. <returns>The public key parameters.</returns>
  25047. </member>
  25048. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.GetEncoded">
  25049. <summary>
  25050. Return the DER encoding of this certificate.
  25051. </summary>
  25052. <returns>A byte array containing the DER encoding of this certificate.</returns>
  25053. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates.CertificateEncodingException">If there is an error encoding the certificate.</exception>
  25054. </member>
  25055. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.Verify(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  25056. <summary>
  25057. Verify the certificate's signature using the nominated public key.
  25058. </summary>
  25059. <param name="key">An appropriate public key parameter object, RsaPublicKeyParameters, DsaPublicKeyParameters or ECDsaPublicKeyParameters</param>
  25060. <returns>True if the signature is valid.</returns>
  25061. <exception cref="T:System.Exception">If key submitted is not of the above nominated types.</exception>
  25062. </member>
  25063. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate.Verify(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifierFactoryProvider)">
  25064. <summary>
  25065. Verify the certificate's signature using a verifier created using the passed in verifier provider.
  25066. </summary>
  25067. <param name="verifierProvider">An appropriate provider for verifying the certificate's signature.</param>
  25068. <returns>True if the signature is valid.</returns>
  25069. <exception cref="T:System.Exception">If verifier provider is not appropriate or the certificate algorithm is invalid.</exception>
  25070. </member>
  25071. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertificatePair">
  25072. <remarks>
  25073. This class contains a cross certificate pair. Cross certificates pairs may
  25074. contain two cross signed certificates from two CAs. A certificate from the
  25075. other CA to this CA is contained in the forward certificate, the certificate
  25076. from this CA to the other CA is contained in the reverse certificate.
  25077. </remarks>
  25078. </member>
  25079. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertificatePair.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  25080. <summary>Constructor</summary>
  25081. <param name="forward">Certificate from the other CA to this CA.</param>
  25082. <param name="reverse">Certificate from this CA to the other CA.</param>
  25083. </member>
  25084. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertificatePair.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CertificatePair)">
  25085. <summary>Constructor from a ASN.1 CertificatePair structure.</summary>
  25086. <param name="pair">The <c>CertificatePair</c> ASN.1 object.</param>
  25087. </member>
  25088. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertificatePair.Forward">
  25089. <summary>Returns the certificate from the other CA to this CA.</summary>
  25090. </member>
  25091. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertificatePair.Reverse">
  25092. <summary>Returns the certificate from this CA to the other CA.</summary>
  25093. </member>
  25094. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertificateParser">
  25095. class for dealing with X509 certificates.
  25096. <p>
  25097. At the moment this will deal with "-----BEGIN CERTIFICATE-----" to "-----END CERTIFICATE-----"
  25098. base 64 encoded certs, as well as the BER binaries of certificates and some classes of PKCS#7
  25099. objects.</p>
  25100. </member>
  25101. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertificateParser.ReadCertificate(System.Byte[])">
  25102. <summary>
  25103. Create loading data from byte array.
  25104. </summary>
  25105. <param name="input"></param>
  25106. </member>
  25107. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertificateParser.ReadCertificates(System.Byte[])">
  25108. <summary>
  25109. Create loading data from byte array.
  25110. </summary>
  25111. <param name="input"></param>
  25112. </member>
  25113. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertificateParser.ReadCertificate(System.IO.Stream)">
  25114. Generates a certificate object and initializes it with the data
  25115. read from the input stream inStream.
  25116. </member>
  25117. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertificateParser.ReadCertificates(System.IO.Stream)">
  25118. Returns a (possibly empty) collection view of the certificates
  25119. read from the given input stream inStream.
  25120. </member>
  25121. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertPairParser.ReadCertPair(System.Byte[])">
  25122. <summary>
  25123. Create loading data from byte array.
  25124. </summary>
  25125. <param name="input"></param>
  25126. </member>
  25127. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CertPairParser.ReadCertPairs(System.Byte[])">
  25128. <summary>
  25129. Create loading data from byte array.
  25130. </summary>
  25131. <param name="input"></param>
  25132. </member>
  25133. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl">
  25134. The following extensions are listed in RFC 2459 as relevant to CRLs
  25135. Authority Key Identifier
  25136. Issuer Alternative Name
  25137. CRL Number
  25138. Delta CRL Indicator (critical)
  25139. Issuing Distribution Point (critical)
  25140. </member>
  25141. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl.Verify(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifierFactoryProvider)">
  25142. <summary>
  25143. Verify the CRL's signature using a verifier created using the passed in verifier provider.
  25144. </summary>
  25145. <param name="verifierProvider">An appropriate provider for verifying the CRL's signature.</param>
  25146. <returns>True if the signature is valid.</returns>
  25147. <exception cref="T:System.Exception">If verifier provider is not appropriate or the CRL algorithm is invalid.</exception>
  25148. </member>
  25149. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl.GetEncoded">
  25150. <summary>
  25151. Return the DER encoding of this CRL.
  25152. </summary>
  25153. <returns>A byte array containing the DER encoding of this CRL.</returns>
  25154. <exception cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates.CrlException">If there is an error encoding the CRL.</exception>
  25155. </member>
  25156. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl.ToString">
  25157. Returns a string representation of this CRL.
  25158. @return a string representation of this CRL.
  25159. </member>
  25160. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl.IsRevoked(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  25161. Checks whether the given certificate is on this CRL.
  25162. @param cert the certificate to check for.
  25163. @return true if the given certificate is on this CRL,
  25164. false otherwise.
  25165. </member>
  25166. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CrlEntry">
  25167. The following extensions are listed in RFC 2459 as relevant to CRL Entries
  25168. ReasonCode Hode Instruction Code Invalidity Date Certificate Issuer
  25169. (critical)
  25170. </member>
  25171. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CrlEntry.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.CrlEntry,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name)">
  25172. Constructor for CRLEntries of indirect CRLs. If <code>isIndirect</code>
  25173. is <code>false</code> {@link #getCertificateIssuer()} will always
  25174. return <code>null</code>, <code>previousCertificateIssuer</code> is
  25175. ignored. If this <code>isIndirect</code> is specified and this CrlEntry
  25176. has no certificate issuer CRL entry extension
  25177. <code>previousCertificateIssuer</code> is returned by
  25178. {@link #getCertificateIssuer()}.
  25179. @param c
  25180. TbsCertificateList.CrlEntry object.
  25181. @param isIndirect
  25182. <code>true</code> if the corresponding CRL is a indirect
  25183. CRL.
  25184. @param previousCertificateIssuer
  25185. Certificate issuer of the previous CrlEntry.
  25186. </member>
  25187. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CrlParser.ReadCrl(System.Byte[])">
  25188. <summary>
  25189. Create loading data from byte array.
  25190. </summary>
  25191. <param name="input"></param>
  25192. </member>
  25193. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CrlParser.ReadCrls(System.Byte[])">
  25194. <summary>
  25195. Create loading data from byte array.
  25196. </summary>
  25197. <param name="input"></param>
  25198. </member>
  25199. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CrlParser.ReadCrl(System.IO.Stream)">
  25200. Generates a certificate revocation list (CRL) object and initializes
  25201. it with the data read from the input stream inStream.
  25202. </member>
  25203. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509CrlParser.ReadCrls(System.IO.Stream)">
  25204. Returns a (possibly empty) collection view of the CRLs read from
  25205. the given input stream inStream.
  25206. The inStream may contain a sequence of DER-encoded CRLs, or
  25207. a PKCS#7 CRL set. This is a PKCS#7 SignedData object, with the
  25208. only significant field being crls. In particular the signature
  25209. and the contents are ignored.
  25210. </member>
  25211. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509ExtensionBase.GetNonCriticalExtensionOids">
  25212. <summary>
  25213. Get non critical extensions.
  25214. </summary>
  25215. <returns>A set of non critical extension oids.</returns>
  25216. </member>
  25217. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509ExtensionBase.GetCriticalExtensionOids">
  25218. <summary>
  25219. Get any critical extensions.
  25220. </summary>
  25221. <returns>A sorted list of critical entension.</returns>
  25222. </member>
  25223. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509KeyUsage">
  25224. A holding class for constructing an X509 Key Usage extension.
  25225. <pre>
  25226. id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 }
  25227. KeyUsage ::= BIT STRING {
  25228. digitalSignature (0),
  25229. nonRepudiation (1),
  25230. keyEncipherment (2),
  25231. dataEncipherment (3),
  25232. keyAgreement (4),
  25233. keyCertSign (5),
  25234. cRLSign (6),
  25235. encipherOnly (7),
  25236. decipherOnly (8) }
  25237. </pre>
  25238. </member>
  25239. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509KeyUsage.#ctor(System.Int32)">
  25240. Basic constructor.
  25241. @param usage - the bitwise OR of the Key Usage flags giving the
  25242. allowed uses for the key.
  25243. e.g. (X509KeyUsage.keyEncipherment | X509KeyUsage.dataEncipherment)
  25244. </member>
  25245. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509SignatureUtilities.GetDigestAlgName(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  25246. Return the digest algorithm using one of the standard JCA string
  25247. representations rather than the algorithm identifier (if possible).
  25248. </member>
  25249. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V1CertificateGenerator">
  25250. <summary>
  25251. Class to Generate X509V1 Certificates.
  25252. </summary>
  25253. </member>
  25254. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V1CertificateGenerator.#ctor">
  25255. <summary>
  25256. Default Constructor.
  25257. </summary>
  25258. </member>
  25259. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V1CertificateGenerator.Reset">
  25260. <summary>
  25261. Reset the generator.
  25262. </summary>
  25263. </member>
  25264. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V1CertificateGenerator.SetSerialNumber(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  25265. <summary>
  25266. Set the certificate's serial number.
  25267. </summary>
  25268. <remarks>Make serial numbers long, if you have no serial number policy make sure the number is at least 16 bytes of secure random data.
  25269. You will be surprised how ugly a serial number collision can get.</remarks>
  25270. <param name="serialNumber">The serial number.</param>
  25271. </member>
  25272. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V1CertificateGenerator.SetIssuerDN(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name)">
  25273. <summary>
  25274. Set the issuer distinguished name.
  25275. The issuer is the entity whose private key is used to sign the certificate.
  25276. </summary>
  25277. <param name="issuer">The issuers DN.</param>
  25278. </member>
  25279. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V1CertificateGenerator.SetNotBefore(System.DateTime)">
  25280. <summary>
  25281. Set the date that this certificate is to be valid from.
  25282. </summary>
  25283. <param name="date"/>
  25284. </member>
  25285. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V1CertificateGenerator.SetNotAfter(System.DateTime)">
  25286. <summary>
  25287. Set the date after which this certificate will no longer be valid.
  25288. </summary>
  25289. <param name="date"/>
  25290. </member>
  25291. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V1CertificateGenerator.SetSubjectDN(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name)">
  25292. <summary>
  25293. Set the subject distinguished name.
  25294. The subject describes the entity associated with the public key.
  25295. </summary>
  25296. <param name="subject"/>
  25297. </member>
  25298. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V1CertificateGenerator.SetPublicKey(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  25299. <summary>
  25300. Set the public key that this certificate identifies.
  25301. </summary>
  25302. <param name="publicKey"/>
  25303. </member>
  25304. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V1CertificateGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory)">
  25305. <summary>
  25306. Generate a new <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate"/> using the provided <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory"/>.
  25307. </summary>
  25308. <param name="signatureFactory">A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory">signature factory</see> with the necessary
  25309. algorithm details.</param>
  25310. <returns>An <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate"/>.</returns>
  25311. </member>
  25312. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V1CertificateGenerator.SignatureAlgNames">
  25313. <summary>
  25314. Allows enumeration of the signature names supported by the generator.
  25315. </summary>
  25316. </member>
  25317. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificate">
  25318. <summary>An implementation of a version 2 X.509 Attribute Certificate.</summary>
  25319. </member>
  25320. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificate.Verify(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IVerifierFactoryProvider)">
  25321. <summary>
  25322. Verify the certificate's signature using a verifier created using the passed in verifier provider.
  25323. </summary>
  25324. <param name="verifierProvider">An appropriate provider for verifying the certificate's signature.</param>
  25325. <returns>True if the signature is valid.</returns>
  25326. <exception cref="T:System.Exception">If verifier provider is not appropriate or the certificate algorithm is invalid.</exception>
  25327. </member>
  25328. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator">
  25329. <remarks>Class to produce an X.509 Version 2 AttributeCertificate.</remarks>
  25330. </member>
  25331. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.Reset">
  25332. <summary>Reset the generator</summary>
  25333. </member>
  25334. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.SetHolder(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateHolder)">
  25335. <summary>Set the Holder of this Attribute Certificate.</summary>
  25336. </member>
  25337. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.SetIssuer(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.AttributeCertificateIssuer)">
  25338. <summary>Set the issuer.</summary>
  25339. </member>
  25340. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.SetSerialNumber(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  25341. <summary>Set the serial number for the certificate.</summary>
  25342. </member>
  25343. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.AddAttribute(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Attribute)">
  25344. <summary>Add an attribute.</summary>
  25345. </member>
  25346. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.AddExtension(System.String,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  25347. <summary>Add a given extension field for the standard extensions tag.</summary>
  25348. </member>
  25349. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.AddExtension(System.String,System.Boolean,System.Byte[])">
  25350. <summary>
  25351. Add a given extension field for the standard extensions tag.
  25352. The value parameter becomes the contents of the octet string associated
  25353. with the extension.
  25354. </summary>
  25355. </member>
  25356. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory)">
  25357. <summary>
  25358. Generate a new <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificate"/> using the provided <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory"/>.
  25359. </summary>
  25360. <param name="signatureFactory">A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory">signature factory</see> with the necessary
  25361. algorithm details.</param>
  25362. <returns>An <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificate"/>.</returns>
  25363. </member>
  25364. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.SignatureAlgNames">
  25365. <summary>
  25366. Allows enumeration of the signature names supported by the generator.
  25367. </summary>
  25368. </member>
  25369. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator">
  25370. class to produce an X.509 Version 2 CRL.
  25371. </member>
  25372. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.Reset">
  25373. reset the generator
  25374. </member>
  25375. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.SetIssuerDN(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name)">
  25376. Set the issuer distinguished name - the issuer is the entity whose private key is used to sign the
  25377. certificate.
  25378. </member>
  25379. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.AddCrlEntry(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.DateTime,System.Int32)">
  25380. Reason being as indicated by CrlReason, i.e. CrlReason.KeyCompromise
  25381. or 0 if CrlReason is not to be used
  25382. </member>
  25383. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.AddCrlEntry(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.DateTime,System.Int32,System.DateTime)">
  25384. Add a CRL entry with an Invalidity Date extension as well as a CrlReason extension.
  25385. Reason being as indicated by CrlReason, i.e. CrlReason.KeyCompromise
  25386. or 0 if CrlReason is not to be used
  25387. </member>
  25388. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.AddCrlEntry(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger,System.DateTime,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Extensions)">
  25389. Add a CRL entry with extensions.
  25390. </member>
  25391. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.AddCrl(Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl)">
  25392. Add the CRLEntry objects contained in a previous CRL.
  25393. @param other the X509Crl to source the other entries from.
  25394. </member>
  25395. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.AddExtension(System.String,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  25396. add a given extension field for the standard extensions tag (tag 0)
  25397. </member>
  25398. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.AddExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  25399. add a given extension field for the standard extensions tag (tag 0)
  25400. </member>
  25401. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.AddExtension(System.String,System.Boolean,System.Byte[])">
  25402. add a given extension field for the standard extensions tag (tag 0)
  25403. </member>
  25404. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.AddExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,System.Byte[])">
  25405. add a given extension field for the standard extensions tag (tag 0)
  25406. </member>
  25407. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory)">
  25408. <summary>
  25409. Generate a new <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl"/> using the provided <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory"/>.
  25410. </summary>
  25411. <param name="signatureFactory">A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory">signature factory</see> with the necessary
  25412. algorithm details.</param>
  25413. <returns>An <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Crl"/>.</returns>
  25414. </member>
  25415. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V2CrlGenerator.SignatureAlgNames">
  25416. <summary>
  25417. Allows enumeration of the signature names supported by the generator.
  25418. </summary>
  25419. </member>
  25420. <member name="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator">
  25421. <summary>
  25422. A class to Generate Version 3 X509Certificates.
  25423. </summary>
  25424. </member>
  25425. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.Reset">
  25426. <summary>
  25427. Reset the Generator.
  25428. </summary>
  25429. </member>
  25430. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.SetSerialNumber(Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.BigInteger)">
  25431. <summary>
  25432. Set the certificate's serial number.
  25433. </summary>
  25434. <remarks>Make serial numbers long, if you have no serial number policy make sure the number is at least 16 bytes of secure random data.
  25435. You will be surprised how ugly a serial number collision can Get.</remarks>
  25436. <param name="serialNumber">The serial number.</param>
  25437. </member>
  25438. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.SetIssuerDN(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name)">
  25439. <summary>
  25440. Set the distinguished name of the issuer.
  25441. The issuer is the entity which is signing the certificate.
  25442. </summary>
  25443. <param name="issuer">The issuer's DN.</param>
  25444. </member>
  25445. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.SetNotBefore(System.DateTime)">
  25446. <summary>
  25447. Set the date that this certificate is to be valid from.
  25448. </summary>
  25449. <param name="date"/>
  25450. </member>
  25451. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.SetNotAfter(System.DateTime)">
  25452. <summary>
  25453. Set the date after which this certificate will no longer be valid.
  25454. </summary>
  25455. <param name="date"/>
  25456. </member>
  25457. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.SetSubjectDN(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.X509Name)">
  25458. <summary>
  25459. Set the DN of the entity that this certificate is about.
  25460. </summary>
  25461. <param name="subject"/>
  25462. </member>
  25463. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.SetPublicKey(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  25464. <summary>
  25465. Set the public key that this certificate identifies.
  25466. </summary>
  25467. <param name="publicKey"/>
  25468. </member>
  25469. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.SetSubjectUniqueID(System.Boolean[])">
  25470. <summary>
  25471. Set the subject unique ID - note: it is very rare that it is correct to do this.
  25472. </summary>
  25473. <param name="uniqueID"/>
  25474. </member>
  25475. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.SetIssuerUniqueID(System.Boolean[])">
  25476. <summary>
  25477. Set the issuer unique ID - note: it is very rare that it is correct to do this.
  25478. </summary>
  25479. <param name="uniqueID"/>
  25480. </member>
  25481. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.AddExtension(System.String,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  25482. <summary>
  25483. Add a given extension field for the standard extensions tag (tag 3).
  25484. </summary>
  25485. <param name="oid">string containing a dotted decimal Object Identifier.</param>
  25486. <param name="critical">Is it critical.</param>
  25487. <param name="extensionValue">The value.</param>
  25488. </member>
  25489. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.AddExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Encodable)">
  25490. <summary>
  25491. Add an extension to this certificate.
  25492. </summary>
  25493. <param name="oid">Its Object Identifier.</param>
  25494. <param name="critical">Is it critical.</param>
  25495. <param name="extensionValue">The value.</param>
  25496. </member>
  25497. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.AddExtension(System.String,System.Boolean,System.Byte[])">
  25498. <summary>
  25499. Add an extension using a string with a dotted decimal OID.
  25500. </summary>
  25501. <param name="oid">string containing a dotted decimal Object Identifier.</param>
  25502. <param name="critical">Is it critical.</param>
  25503. <param name="extensionValue">byte[] containing the value of this extension.</param>
  25504. </member>
  25505. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.AddExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,System.Byte[])">
  25506. <summary>
  25507. Add an extension to this certificate.
  25508. </summary>
  25509. <param name="oid">Its Object Identifier.</param>
  25510. <param name="critical">Is it critical.</param>
  25511. <param name="extensionValue">byte[] containing the value of this extension.</param>
  25512. </member>
  25513. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.CopyAndAddExtension(System.String,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  25514. <summary>
  25515. Add a given extension field for the standard extensions tag (tag 3),
  25516. copying the extension value from another certificate.
  25517. </summary>
  25518. </member>
  25519. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.CopyAndAddExtension(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate)">
  25520. add a given extension field for the standard extensions tag (tag 3)
  25521. copying the extension value from another certificate.
  25522. @throws CertificateParsingException if the extension cannot be extracted.
  25523. </member>
  25524. <member name="M:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.Generate(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory)">
  25525. <summary>
  25526. Generate a new <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate"/> using the provided <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory"/>.
  25527. </summary>
  25528. <param name="signatureFactory">A <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ISignatureFactory">signature factory</see> with the necessary
  25529. algorithm details.</param>
  25530. <returns>An <see cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509Certificate"/>.</returns>
  25531. </member>
  25532. <member name="P:Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.X509V3CertificateGenerator.SignatureAlgNames">
  25533. <summary>
  25534. Allows enumeration of the signature names supported by the generator.
  25535. </summary>
  25536. </member>
  25537. <member name="T:Best.HTTP.Shared.Compression.Crc.CRC32">
  25538. <summary>
  25539. Computes a CRC-32. The CRC-32 algorithm is parameterized - you
  25540. can set the polynomial and enable or disable bit
  25541. reversal. This can be used for GZIP, BZip2, or ZIP.
  25542. </summary>
  25543. <remarks>
  25544. This type is used internally by DotNetZip; it is generally not used
  25545. directly by applications wishing to create, read, or manipulate zip
  25546. archive files.
  25547. </remarks>
  25548. </member>
  25549. <member name="P:Best.HTTP.Shared.Compression.Crc.CRC32.TotalBytesRead">
  25550. <summary>
  25551. Indicates the total number of bytes applied to the CRC.
  25552. </summary>
  25553. </member>
  25554. <member name="P:Best.HTTP.Shared.Compression.Crc.CRC32.Crc32Result">
  25555. <summary>
  25556. Indicates the current CRC for all blocks slurped in.
  25557. </summary>
  25558. </member>
  25559. <member name="M:Best.HTTP.Shared.Compression.Crc.CRC32.GetCrc32(System.IO.Stream)">
  25560. <summary>
  25561. Returns the CRC32 for the specified stream.
  25562. </summary>
  25563. <param name="input">The stream over which to calculate the CRC32</param>
  25564. <returns>the CRC32 calculation</returns>
  25565. </member>
  25566. <member name="M:Best.HTTP.Shared.Compression.Crc.CRC32.GetCrc32AndCopy(System.IO.Stream,System.IO.Stream)">
  25567. <summary>
  25568. Returns the CRC32 for the specified stream, and writes the input into the
  25569. output stream.
  25570. </summary>
  25571. <param name="input">The stream over which to calculate the CRC32</param>
  25572. <param name="output">The stream into which to deflate the input</param>
  25573. <returns>the CRC32 calculation</returns>
  25574. </member>
  25575. <member name="M:Best.HTTP.Shared.Compression.Crc.CRC32.ComputeCrc32(System.Int32,System.Byte)">
  25576. <summary>
  25577. Get the CRC32 for the given (word,byte) combo. This is a
  25578. computation defined by PKzip for PKZIP 2.0 (weak) encryption.
  25579. </summary>
  25580. <param name="W">The word to start with.</param>
  25581. <param name="B">The byte to combine it with.</param>
  25582. <returns>The CRC-ized result.</returns>
  25583. </member>
  25584. <member name="M:Best.HTTP.Shared.Compression.Crc.CRC32.SlurpBlock(System.Byte[],System.Int32,System.Int32)">
  25585. <summary>
  25586. Update the value for the running CRC32 using the given block of bytes.
  25587. This is useful when using the CRC32() class in a Stream.
  25588. </summary>
  25589. <param name="block">block of bytes to slurp</param>
  25590. <param name="offset">starting point in the block</param>
  25591. <param name="count">how many bytes within the block to slurp</param>
  25592. </member>
  25593. <member name="M:Best.HTTP.Shared.Compression.Crc.CRC32.UpdateCRC(System.Byte)">
  25594. <summary>
  25595. Process one byte in the CRC.
  25596. </summary>
  25597. <param name = "b">the byte to include into the CRC . </param>
  25598. </member>
  25599. <member name="M:Best.HTTP.Shared.Compression.Crc.CRC32.UpdateCRC(System.Byte,System.Int32)">
  25600. <summary>
  25601. Process a run of N identical bytes into the CRC.
  25602. </summary>
  25603. <remarks>
  25604. <para>
  25605. This method serves as an optimization for updating the CRC when a
  25606. run of identical bytes is found. Rather than passing in a buffer of
  25607. length n, containing all identical bytes b, this method accepts the
  25608. byte value and the length of the (virtual) buffer - the length of
  25609. the run.
  25610. </para>
  25611. </remarks>
  25612. <param name = "b">the byte to include into the CRC. </param>
  25613. <param name = "n">the number of times that byte should be repeated. </param>
  25614. </member>
  25615. <member name="M:Best.HTTP.Shared.Compression.Crc.CRC32.Combine(System.Int32,System.Int32)">
  25616. <summary>
  25617. Combines the given CRC32 value with the current running total.
  25618. </summary>
  25619. <remarks>
  25620. This is useful when using a divide-and-conquer approach to
  25621. calculating a CRC. Multiple threads can each calculate a
  25622. CRC32 on a segment of the data, and then combine the
  25623. individual CRC32 values at the end.
  25624. </remarks>
  25625. <param name="crc">the crc value to be combined with this one</param>
  25626. <param name="length">the length of data the CRC value was calculated on</param>
  25627. </member>
  25628. <member name="M:Best.HTTP.Shared.Compression.Crc.CRC32.#ctor">
  25629. <summary>
  25630. Create an instance of the CRC32 class using the default settings: no
  25631. bit reversal, and a polynomial of 0xEDB88320.
  25632. </summary>
  25633. </member>
  25634. <member name="M:Best.HTTP.Shared.Compression.Crc.CRC32.#ctor(System.Boolean)">
  25635. <summary>
  25636. Create an instance of the CRC32 class, specifying whether to reverse
  25637. data bits or not.
  25638. </summary>
  25639. <param name='reverseBits'>
  25640. specify true if the instance should reverse data bits.
  25641. </param>
  25642. <remarks>
  25643. <para>
  25644. In the CRC-32 used by BZip2, the bits are reversed. Therefore if you
  25645. want a CRC32 with compatibility with BZip2, you should pass true
  25646. here. In the CRC-32 used by GZIP and PKZIP, the bits are not
  25647. reversed; Therefore if you want a CRC32 with compatibility with
  25648. those, you should pass false.
  25649. </para>
  25650. </remarks>
  25651. </member>
  25652. <member name="M:Best.HTTP.Shared.Compression.Crc.CRC32.#ctor(System.Int32,System.Boolean)">
  25653. <summary>
  25654. Create an instance of the CRC32 class, specifying the polynomial and
  25655. whether to reverse data bits or not.
  25656. </summary>
  25657. <param name='polynomial'>
  25658. The polynomial to use for the CRC, expressed in the reversed (LSB)
  25659. format: the highest ordered bit in the polynomial value is the
  25660. coefficient of the 0th power; the second-highest order bit is the
  25661. coefficient of the 1 power, and so on. Expressed this way, the
  25662. polynomial for the CRC-32C used in IEEE 802.3, is 0xEDB88320.
  25663. </param>
  25664. <param name='reverseBits'>
  25665. specify true if the instance should reverse data bits.
  25666. </param>
  25667. <remarks>
  25668. <para>
  25669. In the CRC-32 used by BZip2, the bits are reversed. Therefore if you
  25670. want a CRC32 with compatibility with BZip2, you should pass true
  25671. here for the <c>reverseBits</c> parameter. In the CRC-32 used by
  25672. GZIP and PKZIP, the bits are not reversed; Therefore if you want a
  25673. CRC32 with compatibility with those, you should pass false for the
  25674. <c>reverseBits</c> parameter.
  25675. </para>
  25676. </remarks>
  25677. </member>
  25678. <member name="M:Best.HTTP.Shared.Compression.Crc.CRC32.Reset">
  25679. <summary>
  25680. Reset the CRC-32 class - clear the CRC "remainder register."
  25681. </summary>
  25682. <remarks>
  25683. <para>
  25684. Use this when employing a single instance of this class to compute
  25685. multiple, distinct CRCs on multiple, distinct data blocks.
  25686. </para>
  25687. </remarks>
  25688. </member>
  25689. <member name="T:Best.HTTP.Shared.Compression.Zlib.DeflateStream">
  25690. <summary>
  25691. A class for compressing and decompressing streams using the Deflate algorithm.
  25692. </summary>
  25693. <remarks>
  25694. <para>
  25695. The DeflateStream is a <see
  25696. href="http://en.wikipedia.org/wiki/Decorator_pattern">Decorator</see> on a <see
  25697. cref="T:System.IO.Stream"/>. It adds DEFLATE compression or decompression to any
  25698. stream.
  25699. </para>
  25700. <para>
  25701. Using this stream, applications can compress or decompress data via stream
  25702. <c>Read</c> and <c>Write</c> operations. Either compresssion or decompression
  25703. can occur through either reading or writing. The compression format used is
  25704. DEFLATE, which is documented in <see
  25705. href="http://www.ietf.org/rfc/rfc1951.txt">IETF RFC 1951</see>, "DEFLATE
  25706. Compressed Data Format Specification version 1.3.".
  25707. </para>
  25708. </remarks>
  25709. <seealso cref="T:Best.HTTP.Shared.Compression.Zlib.GZipStream" />
  25710. </member>
  25711. <member name="M:Best.HTTP.Shared.Compression.Zlib.DeflateStream.#ctor(System.IO.Stream,Best.HTTP.Shared.Compression.Zlib.CompressionMode)">
  25712. <summary>
  25713. Create a DeflateStream using the specified CompressionMode.
  25714. </summary>
  25715. <remarks>
  25716. When mode is <c>CompressionMode.Compress</c>, the DeflateStream will use
  25717. the default compression level. The "captive" stream will be closed when
  25718. the DeflateStream is closed.
  25719. </remarks>
  25720. <example>
  25721. This example uses a DeflateStream to compress data from a file, and writes
  25722. the compressed data to another file.
  25723. <code>
  25724. using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress))
  25725. {
  25726. using (var raw = System.IO.File.Create(fileToCompress + ".deflated"))
  25727. {
  25728. using (Stream compressor = new DeflateStream(raw, CompressionMode.Compress))
  25729. {
  25730. byte[] buffer = new byte[WORKING_BUFFER_SIZE];
  25731. int n;
  25732. while ((n= input.Read(buffer, 0, buffer.Length)) != 0)
  25733. {
  25734. compressor.Write(buffer, 0, n);
  25735. }
  25736. }
  25737. }
  25738. }
  25739. </code>
  25740. <code lang="VB">
  25741. Using input As Stream = File.OpenRead(fileToCompress)
  25742. Using raw As FileStream = File.Create(fileToCompress &amp; ".deflated")
  25743. Using compressor As Stream = New DeflateStream(raw, CompressionMode.Compress)
  25744. Dim buffer As Byte() = New Byte(4096) {}
  25745. Dim n As Integer = -1
  25746. Do While (n &lt;&gt; 0)
  25747. If (n &gt; 0) Then
  25748. compressor.Write(buffer, 0, n)
  25749. End If
  25750. n = input.Read(buffer, 0, buffer.Length)
  25751. Loop
  25752. End Using
  25753. End Using
  25754. End Using
  25755. </code>
  25756. </example>
  25757. <param name="stream">The stream which will be read or written.</param>
  25758. <param name="mode">Indicates whether the DeflateStream will compress or decompress.</param>
  25759. </member>
  25760. <member name="M:Best.HTTP.Shared.Compression.Zlib.DeflateStream.#ctor(System.IO.Stream,Best.HTTP.Shared.Compression.Zlib.CompressionMode,Best.HTTP.Shared.Compression.Zlib.CompressionLevel)">
  25761. <summary>
  25762. Create a DeflateStream using the specified CompressionMode and the specified CompressionLevel.
  25763. </summary>
  25764. <remarks>
  25765. <para>
  25766. When mode is <c>CompressionMode.Decompress</c>, the level parameter is
  25767. ignored. The "captive" stream will be closed when the DeflateStream is
  25768. closed.
  25769. </para>
  25770. </remarks>
  25771. <example>
  25772. This example uses a DeflateStream to compress data from a file, and writes
  25773. the compressed data to another file.
  25774. <code>
  25775. using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress))
  25776. {
  25777. using (var raw = System.IO.File.Create(fileToCompress + ".deflated"))
  25778. {
  25779. using (Stream compressor = new DeflateStream(raw,
  25780. CompressionMode.Compress,
  25781. CompressionLevel.BestCompression))
  25782. {
  25783. byte[] buffer = new byte[WORKING_BUFFER_SIZE];
  25784. int n= -1;
  25785. while (n != 0)
  25786. {
  25787. if (n &gt; 0)
  25788. compressor.Write(buffer, 0, n);
  25789. n= input.Read(buffer, 0, buffer.Length);
  25790. }
  25791. }
  25792. }
  25793. }
  25794. </code>
  25795. <code lang="VB">
  25796. Using input As Stream = File.OpenRead(fileToCompress)
  25797. Using raw As FileStream = File.Create(fileToCompress &amp; ".deflated")
  25798. Using compressor As Stream = New DeflateStream(raw, CompressionMode.Compress, CompressionLevel.BestCompression)
  25799. Dim buffer As Byte() = New Byte(4096) {}
  25800. Dim n As Integer = -1
  25801. Do While (n &lt;&gt; 0)
  25802. If (n &gt; 0) Then
  25803. compressor.Write(buffer, 0, n)
  25804. End If
  25805. n = input.Read(buffer, 0, buffer.Length)
  25806. Loop
  25807. End Using
  25808. End Using
  25809. End Using
  25810. </code>
  25811. </example>
  25812. <param name="stream">The stream to be read or written while deflating or inflating.</param>
  25813. <param name="mode">Indicates whether the <c>DeflateStream</c> will compress or decompress.</param>
  25814. <param name="level">A tuning knob to trade speed for effectiveness.</param>
  25815. </member>
  25816. <member name="M:Best.HTTP.Shared.Compression.Zlib.DeflateStream.#ctor(System.IO.Stream,Best.HTTP.Shared.Compression.Zlib.CompressionMode,System.Boolean)">
  25817. <summary>
  25818. Create a <c>DeflateStream</c> using the specified
  25819. <c>CompressionMode</c>, and explicitly specify whether the
  25820. stream should be left open after Deflation or Inflation.
  25821. </summary>
  25822. <remarks>
  25823. <para>
  25824. This constructor allows the application to request that the captive stream
  25825. remain open after the deflation or inflation occurs. By default, after
  25826. <c>Close()</c> is called on the stream, the captive stream is also
  25827. closed. In some cases this is not desired, for example if the stream is a
  25828. memory stream that will be re-read after compression. Specify true for
  25829. the <paramref name="leaveOpen"/> parameter to leave the stream open.
  25830. </para>
  25831. <para>
  25832. The <c>DeflateStream</c> will use the default compression level.
  25833. </para>
  25834. <para>
  25835. See the other overloads of this constructor for example code.
  25836. </para>
  25837. </remarks>
  25838. <param name="stream">
  25839. The stream which will be read or written. This is called the
  25840. "captive" stream in other places in this documentation.
  25841. </param>
  25842. <param name="mode">
  25843. Indicates whether the <c>DeflateStream</c> will compress or decompress.
  25844. </param>
  25845. <param name="leaveOpen">true if the application would like the stream to
  25846. remain open after inflation/deflation.</param>
  25847. </member>
  25848. <member name="M:Best.HTTP.Shared.Compression.Zlib.DeflateStream.#ctor(System.IO.Stream,Best.HTTP.Shared.Compression.Zlib.CompressionMode,Best.HTTP.Shared.Compression.Zlib.CompressionLevel,System.Boolean)">
  25849. <summary>
  25850. Create a <c>DeflateStream</c> using the specified <c>CompressionMode</c>
  25851. and the specified <c>CompressionLevel</c>, and explicitly specify whether
  25852. the stream should be left open after Deflation or Inflation.
  25853. </summary>
  25854. <remarks>
  25855. <para>
  25856. When mode is <c>CompressionMode.Decompress</c>, the level parameter is ignored.
  25857. </para>
  25858. <para>
  25859. This constructor allows the application to request that the captive stream
  25860. remain open after the deflation or inflation occurs. By default, after
  25861. <c>Close()</c> is called on the stream, the captive stream is also
  25862. closed. In some cases this is not desired, for example if the stream is a
  25863. <see cref="T:System.IO.MemoryStream"/> that will be re-read after
  25864. compression. Specify true for the <paramref name="leaveOpen"/> parameter
  25865. to leave the stream open.
  25866. </para>
  25867. </remarks>
  25868. <example>
  25869. This example shows how to use a <c>DeflateStream</c> to compress data from
  25870. a file, and store the compressed data into another file.
  25871. <code>
  25872. using (var output = System.IO.File.Create(fileToCompress + ".deflated"))
  25873. {
  25874. using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress))
  25875. {
  25876. using (Stream compressor = new DeflateStream(output, CompressionMode.Compress, CompressionLevel.BestCompression, true))
  25877. {
  25878. byte[] buffer = new byte[WORKING_BUFFER_SIZE];
  25879. int n= -1;
  25880. while (n != 0)
  25881. {
  25882. if (n &gt; 0)
  25883. compressor.Write(buffer, 0, n);
  25884. n= input.Read(buffer, 0, buffer.Length);
  25885. }
  25886. }
  25887. }
  25888. // can write additional data to the output stream here
  25889. }
  25890. </code>
  25891. <code lang="VB">
  25892. Using output As FileStream = File.Create(fileToCompress &amp; ".deflated")
  25893. Using input As Stream = File.OpenRead(fileToCompress)
  25894. Using compressor As Stream = New DeflateStream(output, CompressionMode.Compress, CompressionLevel.BestCompression, True)
  25895. Dim buffer As Byte() = New Byte(4096) {}
  25896. Dim n As Integer = -1
  25897. Do While (n &lt;&gt; 0)
  25898. If (n &gt; 0) Then
  25899. compressor.Write(buffer, 0, n)
  25900. End If
  25901. n = input.Read(buffer, 0, buffer.Length)
  25902. Loop
  25903. End Using
  25904. End Using
  25905. ' can write additional data to the output stream here.
  25906. End Using
  25907. </code>
  25908. </example>
  25909. <param name="stream">The stream which will be read or written.</param>
  25910. <param name="mode">Indicates whether the DeflateStream will compress or decompress.</param>
  25911. <param name="leaveOpen">true if the application would like the stream to remain open after inflation/deflation.</param>
  25912. <param name="level">A tuning knob to trade speed for effectiveness.</param>
  25913. </member>
  25914. <member name="M:Best.HTTP.Shared.Compression.Zlib.DeflateStream.#ctor(System.IO.Stream,Best.HTTP.Shared.Compression.Zlib.CompressionMode,Best.HTTP.Shared.Compression.Zlib.CompressionLevel,System.Boolean,System.Int32)">
  25915. <summary>
  25916. Create a <c>DeflateStream</c> using the specified <c>CompressionMode</c>
  25917. and the specified <c>CompressionLevel</c>, and explicitly specify whether
  25918. the stream should be left open after Deflation or Inflation.
  25919. </summary>
  25920. <remarks>
  25921. <para>
  25922. When mode is <c>CompressionMode.Decompress</c>, the level parameter is ignored.
  25923. </para>
  25924. <para>
  25925. This constructor allows the application to request that the captive stream
  25926. remain open after the deflation or inflation occurs. By default, after
  25927. <c>Close()</c> is called on the stream, the captive stream is also
  25928. closed. In some cases this is not desired, for example if the stream is a
  25929. <see cref="T:System.IO.MemoryStream"/> that will be re-read after
  25930. compression. Specify true for the <paramref name="leaveOpen"/> parameter
  25931. to leave the stream open.
  25932. </para>
  25933. </remarks>
  25934. <example>
  25935. This example shows how to use a <c>DeflateStream</c> to compress data from
  25936. a file, and store the compressed data into another file.
  25937. <code>
  25938. using (var output = System.IO.File.Create(fileToCompress + ".deflated"))
  25939. {
  25940. using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress))
  25941. {
  25942. using (Stream compressor = new DeflateStream(output, CompressionMode.Compress, CompressionLevel.BestCompression, true))
  25943. {
  25944. byte[] buffer = new byte[WORKING_BUFFER_SIZE];
  25945. int n= -1;
  25946. while (n != 0)
  25947. {
  25948. if (n &gt; 0)
  25949. compressor.Write(buffer, 0, n);
  25950. n= input.Read(buffer, 0, buffer.Length);
  25951. }
  25952. }
  25953. }
  25954. // can write additional data to the output stream here
  25955. }
  25956. </code>
  25957. <code lang="VB">
  25958. Using output As FileStream = File.Create(fileToCompress &amp; ".deflated")
  25959. Using input As Stream = File.OpenRead(fileToCompress)
  25960. Using compressor As Stream = New DeflateStream(output, CompressionMode.Compress, CompressionLevel.BestCompression, True)
  25961. Dim buffer As Byte() = New Byte(4096) {}
  25962. Dim n As Integer = -1
  25963. Do While (n &lt;&gt; 0)
  25964. If (n &gt; 0) Then
  25965. compressor.Write(buffer, 0, n)
  25966. End If
  25967. n = input.Read(buffer, 0, buffer.Length)
  25968. Loop
  25969. End Using
  25970. End Using
  25971. ' can write additional data to the output stream here.
  25972. End Using
  25973. </code>
  25974. </example>
  25975. <param name="stream">The stream which will be read or written.</param>
  25976. <param name="mode">Indicates whether the DeflateStream will compress or decompress.</param>
  25977. <param name="leaveOpen">true if the application would like the stream to remain open after inflation/deflation.</param>
  25978. <param name="level">A tuning knob to trade speed for effectiveness.</param>
  25979. <param name="windowBits">Desired window bits.</param>
  25980. </member>
  25981. <member name="P:Best.HTTP.Shared.Compression.Zlib.DeflateStream.FlushMode">
  25982. <summary>
  25983. This property sets the flush behavior on the stream.
  25984. </summary>
  25985. <remarks> See the ZLIB documentation for the meaning of the flush behavior.
  25986. </remarks>
  25987. </member>
  25988. <member name="P:Best.HTTP.Shared.Compression.Zlib.DeflateStream.BufferSize">
  25989. <summary>
  25990. The size of the working buffer for the compression codec.
  25991. </summary>
  25992. <remarks>
  25993. <para>
  25994. The working buffer is used for all stream operations. The default size is
  25995. 1024 bytes. The minimum size is 128 bytes. You may get better performance
  25996. with a larger buffer. Then again, you might not. You would have to test
  25997. it.
  25998. </para>
  25999. <para>
  26000. Set this before the first call to <c>Read()</c> or <c>Write()</c> on the
  26001. stream. If you try to set it afterwards, it will throw.
  26002. </para>
  26003. </remarks>
  26004. </member>
  26005. <member name="P:Best.HTTP.Shared.Compression.Zlib.DeflateStream.Strategy">
  26006. <summary>
  26007. The ZLIB strategy to be used during compression.
  26008. </summary>
  26009. <remarks>
  26010. By tweaking this parameter, you may be able to optimize the compression for
  26011. data with particular characteristics.
  26012. </remarks>
  26013. </member>
  26014. <member name="P:Best.HTTP.Shared.Compression.Zlib.DeflateStream.TotalIn">
  26015. <summary> Returns the total number of bytes input so far.</summary>
  26016. </member>
  26017. <member name="P:Best.HTTP.Shared.Compression.Zlib.DeflateStream.TotalOut">
  26018. <summary> Returns the total number of bytes output so far.</summary>
  26019. </member>
  26020. <member name="M:Best.HTTP.Shared.Compression.Zlib.DeflateStream.Dispose(System.Boolean)">
  26021. <summary>
  26022. Dispose the stream.
  26023. </summary>
  26024. <remarks>
  26025. <para>
  26026. This may or may not result in a <c>Close()</c> call on the captive
  26027. stream. See the constructors that have a <c>leaveOpen</c> parameter
  26028. for more information.
  26029. </para>
  26030. <para>
  26031. Application code won't call this code directly. This method may be
  26032. invoked in two distinct scenarios. If disposing == true, the method
  26033. has been called directly or indirectly by a user's code, for example
  26034. via the public Dispose() method. In this case, both managed and
  26035. unmanaged resources can be referenced and disposed. If disposing ==
  26036. false, the method has been called by the runtime from inside the
  26037. object finalizer and this method should not reference other objects;
  26038. in that case only unmanaged resources must be referenced or
  26039. disposed.
  26040. </para>
  26041. </remarks>
  26042. <param name="disposing">
  26043. true if the Dispose method was invoked by user code.
  26044. </param>
  26045. </member>
  26046. <member name="P:Best.HTTP.Shared.Compression.Zlib.DeflateStream.CanRead">
  26047. <summary>
  26048. Indicates whether the stream can be read.
  26049. </summary>
  26050. <remarks>
  26051. The return value depends on whether the captive stream supports reading.
  26052. </remarks>
  26053. </member>
  26054. <member name="P:Best.HTTP.Shared.Compression.Zlib.DeflateStream.CanSeek">
  26055. <summary>
  26056. Indicates whether the stream supports Seek operations.
  26057. </summary>
  26058. <remarks>
  26059. Always returns false.
  26060. </remarks>
  26061. </member>
  26062. <member name="P:Best.HTTP.Shared.Compression.Zlib.DeflateStream.CanWrite">
  26063. <summary>
  26064. Indicates whether the stream can be written.
  26065. </summary>
  26066. <remarks>
  26067. The return value depends on whether the captive stream supports writing.
  26068. </remarks>
  26069. </member>
  26070. <member name="M:Best.HTTP.Shared.Compression.Zlib.DeflateStream.Flush">
  26071. <summary>
  26072. Flush the stream.
  26073. </summary>
  26074. </member>
  26075. <member name="P:Best.HTTP.Shared.Compression.Zlib.DeflateStream.Length">
  26076. <summary>
  26077. Reading this property always throws a <see cref="T:System.NotImplementedException"/>.
  26078. </summary>
  26079. </member>
  26080. <member name="P:Best.HTTP.Shared.Compression.Zlib.DeflateStream.Position">
  26081. <summary>
  26082. The position of the stream pointer.
  26083. </summary>
  26084. <remarks>
  26085. Setting this property always throws a <see
  26086. cref="T:System.NotImplementedException"/>. Reading will return the total bytes
  26087. written out, if used in writing, or the total bytes read in, if used in
  26088. reading. The count may refer to compressed bytes or uncompressed bytes,
  26089. depending on how you've used the stream.
  26090. </remarks>
  26091. </member>
  26092. <member name="M:Best.HTTP.Shared.Compression.Zlib.DeflateStream.Read(System.Byte[],System.Int32,System.Int32)">
  26093. <summary>
  26094. Read data from the stream.
  26095. </summary>
  26096. <remarks>
  26097. <para>
  26098. If you wish to use the <c>DeflateStream</c> to compress data while
  26099. reading, you can create a <c>DeflateStream</c> with
  26100. <c>CompressionMode.Compress</c>, providing an uncompressed data stream.
  26101. Then call Read() on that <c>DeflateStream</c>, and the data read will be
  26102. compressed as you read. If you wish to use the <c>DeflateStream</c> to
  26103. decompress data while reading, you can create a <c>DeflateStream</c> with
  26104. <c>CompressionMode.Decompress</c>, providing a readable compressed data
  26105. stream. Then call Read() on that <c>DeflateStream</c>, and the data read
  26106. will be decompressed as you read.
  26107. </para>
  26108. <para>
  26109. A <c>DeflateStream</c> can be used for <c>Read()</c> or <c>Write()</c>, but not both.
  26110. </para>
  26111. </remarks>
  26112. <param name="buffer">The buffer into which the read data should be placed.</param>
  26113. <param name="offset">the offset within that data array to put the first byte read.</param>
  26114. <param name="count">the number of bytes to read.</param>
  26115. <returns>the number of bytes actually read</returns>
  26116. </member>
  26117. <member name="M:Best.HTTP.Shared.Compression.Zlib.DeflateStream.Seek(System.Int64,System.IO.SeekOrigin)">
  26118. <summary>
  26119. Calling this method always throws a <see cref="T:System.NotImplementedException"/>.
  26120. </summary>
  26121. <param name="offset">this is irrelevant, since it will always throw!</param>
  26122. <param name="origin">this is irrelevant, since it will always throw!</param>
  26123. <returns>irrelevant!</returns>
  26124. </member>
  26125. <member name="M:Best.HTTP.Shared.Compression.Zlib.DeflateStream.SetLength(System.Int64)">
  26126. <summary>
  26127. Will call the base stream's SetLength method.
  26128. </summary>
  26129. </member>
  26130. <member name="M:Best.HTTP.Shared.Compression.Zlib.DeflateStream.Write(System.Byte[],System.Int32,System.Int32)">
  26131. <summary>
  26132. Write data to the stream.
  26133. </summary>
  26134. <remarks>
  26135. <para>
  26136. If you wish to use the <c>DeflateStream</c> to compress data while
  26137. writing, you can create a <c>DeflateStream</c> with
  26138. <c>CompressionMode.Compress</c>, and a writable output stream. Then call
  26139. <c>Write()</c> on that <c>DeflateStream</c>, providing uncompressed data
  26140. as input. The data sent to the output stream will be the compressed form
  26141. of the data written. If you wish to use the <c>DeflateStream</c> to
  26142. decompress data while writing, you can create a <c>DeflateStream</c> with
  26143. <c>CompressionMode.Decompress</c>, and a writable output stream. Then
  26144. call <c>Write()</c> on that stream, providing previously compressed
  26145. data. The data sent to the output stream will be the decompressed form of
  26146. the data written.
  26147. </para>
  26148. <para>
  26149. A <c>DeflateStream</c> can be used for <c>Read()</c> or <c>Write()</c>,
  26150. but not both.
  26151. </para>
  26152. </remarks>
  26153. <param name="buffer">The buffer holding data to write to the stream.</param>
  26154. <param name="offset">the offset within that data array to find the first byte to write.</param>
  26155. <param name="count">the number of bytes to write.</param>
  26156. </member>
  26157. <member name="T:Best.HTTP.Shared.Compression.Zlib.GZipStream">
  26158. <summary>
  26159. A class for compressing and decompressing GZIP streams.
  26160. </summary>
  26161. <remarks>
  26162. <para>
  26163. The <c>GZipStream</c> is a <see
  26164. href="http://en.wikipedia.org/wiki/Decorator_pattern">Decorator</see> on a
  26165. <see cref="T:System.IO.Stream"/>. It adds GZIP compression or decompression to any
  26166. stream.
  26167. </para>
  26168. <para>
  26169. Like the <c>System.IO.Compression.GZipStream</c> in the .NET Base Class Library, the
  26170. <c>Ionic.Zlib.GZipStream</c> can compress while writing, or decompress while
  26171. reading, but not vice versa. The compression method used is GZIP, which is
  26172. documented in <see href="http://www.ietf.org/rfc/rfc1952.txt">IETF RFC
  26173. 1952</see>, "GZIP file format specification version 4.3".</para>
  26174. <para>
  26175. A <c>GZipStream</c> can be used to decompress data (through <c>Read()</c>) or
  26176. to compress data (through <c>Write()</c>), but not both.
  26177. </para>
  26178. <para>
  26179. If you wish to use the <c>GZipStream</c> to compress data, you must wrap it
  26180. around a write-able stream. As you call <c>Write()</c> on the <c>GZipStream</c>, the
  26181. data will be compressed into the GZIP format. If you want to decompress data,
  26182. you must wrap the <c>GZipStream</c> around a readable stream that contains an
  26183. IETF RFC 1952-compliant stream. The data will be decompressed as you call
  26184. <c>Read()</c> on the <c>GZipStream</c>.
  26185. </para>
  26186. <para>
  26187. Though the GZIP format allows data from multiple files to be concatenated
  26188. together, this stream handles only a single segment of GZIP format, typically
  26189. representing a single file.
  26190. </para>
  26191. </remarks>
  26192. <seealso cref="T:Best.HTTP.Shared.Compression.Zlib.DeflateStream" />
  26193. </member>
  26194. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.Comment">
  26195. <summary>
  26196. The comment on the GZIP stream.
  26197. </summary>
  26198. <remarks>
  26199. <para>
  26200. The GZIP format allows for each file to optionally have an associated
  26201. comment stored with the file. The comment is encoded with the ISO-8859-1
  26202. code page. To include a comment in a GZIP stream you create, set this
  26203. property before calling <c>Write()</c> for the first time on the
  26204. <c>GZipStream</c>.
  26205. </para>
  26206. <para>
  26207. When using <c>GZipStream</c> to decompress, you can retrieve this property
  26208. after the first call to <c>Read()</c>. If no comment has been set in the
  26209. GZIP bytestream, the Comment property will return <c>null</c>
  26210. (<c>Nothing</c> in VB).
  26211. </para>
  26212. </remarks>
  26213. </member>
  26214. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.FileName">
  26215. <summary>
  26216. The FileName for the GZIP stream.
  26217. </summary>
  26218. <remarks>
  26219. <para>
  26220. The GZIP format optionally allows each file to have an associated
  26221. filename. When compressing data (through <c>Write()</c>), set this
  26222. FileName before calling <c>Write()</c> the first time on the <c>GZipStream</c>.
  26223. The actual filename is encoded into the GZIP bytestream with the
  26224. ISO-8859-1 code page, according to RFC 1952. It is the application's
  26225. responsibility to insure that the FileName can be encoded and decoded
  26226. correctly with this code page.
  26227. </para>
  26228. <para>
  26229. When decompressing (through <c>Read()</c>), you can retrieve this value
  26230. any time after the first <c>Read()</c>. In the case where there was no filename
  26231. encoded into the GZIP bytestream, the property will return <c>null</c> (<c>Nothing</c>
  26232. in VB).
  26233. </para>
  26234. </remarks>
  26235. </member>
  26236. <member name="F:Best.HTTP.Shared.Compression.Zlib.GZipStream.LastModified">
  26237. <summary>
  26238. The last modified time for the GZIP stream.
  26239. </summary>
  26240. <remarks>
  26241. GZIP allows the storage of a last modified time with each GZIP entity.
  26242. When compressing data, you can set this before the first call to
  26243. <c>Write()</c>. When decompressing, you can retrieve this value any time
  26244. after the first call to <c>Read()</c>.
  26245. </remarks>
  26246. </member>
  26247. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.Crc32">
  26248. <summary>
  26249. The CRC on the GZIP stream.
  26250. </summary>
  26251. <remarks>
  26252. This is used for internal error checking. You probably don't need to look at this property.
  26253. </remarks>
  26254. </member>
  26255. <member name="M:Best.HTTP.Shared.Compression.Zlib.GZipStream.#ctor(System.IO.Stream,Best.HTTP.Shared.Compression.Zlib.CompressionMode)">
  26256. <summary>
  26257. Create a <c>GZipStream</c> using the specified <c>CompressionMode</c>.
  26258. </summary>
  26259. <remarks>
  26260. <para>
  26261. When mode is <c>CompressionMode.Compress</c>, the <c>GZipStream</c> will use the
  26262. default compression level.
  26263. </para>
  26264. <para>
  26265. As noted in the class documentation, the <c>CompressionMode</c> (Compress
  26266. or Decompress) also establishes the "direction" of the stream. A
  26267. <c>GZipStream</c> with <c>CompressionMode.Compress</c> works only through
  26268. <c>Write()</c>. A <c>GZipStream</c> with
  26269. <c>CompressionMode.Decompress</c> works only through <c>Read()</c>.
  26270. </para>
  26271. </remarks>
  26272. <example>
  26273. This example shows how to use a GZipStream to compress data.
  26274. <code>
  26275. using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress))
  26276. {
  26277. using (var raw = System.IO.File.Create(outputFile))
  26278. {
  26279. using (Stream compressor = new GZipStream(raw, CompressionMode.Compress))
  26280. {
  26281. byte[] buffer = new byte[WORKING_BUFFER_SIZE];
  26282. int n;
  26283. while ((n= input.Read(buffer, 0, buffer.Length)) != 0)
  26284. {
  26285. compressor.Write(buffer, 0, n);
  26286. }
  26287. }
  26288. }
  26289. }
  26290. </code>
  26291. <code lang="VB">
  26292. Dim outputFile As String = (fileToCompress &amp; ".compressed")
  26293. Using input As Stream = File.OpenRead(fileToCompress)
  26294. Using raw As FileStream = File.Create(outputFile)
  26295. Using compressor As Stream = New GZipStream(raw, CompressionMode.Compress)
  26296. Dim buffer As Byte() = New Byte(4096) {}
  26297. Dim n As Integer = -1
  26298. Do While (n &lt;&gt; 0)
  26299. If (n &gt; 0) Then
  26300. compressor.Write(buffer, 0, n)
  26301. End If
  26302. n = input.Read(buffer, 0, buffer.Length)
  26303. Loop
  26304. End Using
  26305. End Using
  26306. End Using
  26307. </code>
  26308. </example>
  26309. <example>
  26310. This example shows how to use a GZipStream to uncompress a file.
  26311. <code>
  26312. private void GunZipFile(string filename)
  26313. {
  26314. if (!filename.EndsWith(".gz))
  26315. throw new ArgumentException("filename");
  26316. var DecompressedFile = filename.Substring(0,filename.Length-3);
  26317. byte[] working = new byte[WORKING_BUFFER_SIZE];
  26318. int n= 1;
  26319. using (System.IO.Stream input = System.IO.File.OpenRead(filename))
  26320. {
  26321. using (Stream decompressor= new Ionic.Zlib.GZipStream(input, CompressionMode.Decompress, true))
  26322. {
  26323. using (var output = System.IO.File.Create(DecompressedFile))
  26324. {
  26325. while (n !=0)
  26326. {
  26327. n= decompressor.Read(working, 0, working.Length);
  26328. if (n > 0)
  26329. {
  26330. output.Write(working, 0, n);
  26331. }
  26332. }
  26333. }
  26334. }
  26335. }
  26336. }
  26337. </code>
  26338. <code lang="VB">
  26339. Private Sub GunZipFile(ByVal filename as String)
  26340. If Not (filename.EndsWith(".gz)) Then
  26341. Throw New ArgumentException("filename")
  26342. End If
  26343. Dim DecompressedFile as String = filename.Substring(0,filename.Length-3)
  26344. Dim working(WORKING_BUFFER_SIZE) as Byte
  26345. Dim n As Integer = 1
  26346. Using input As Stream = File.OpenRead(filename)
  26347. Using decompressor As Stream = new Ionic.Zlib.GZipStream(input, CompressionMode.Decompress, True)
  26348. Using output As Stream = File.Create(UncompressedFile)
  26349. Do
  26350. n= decompressor.Read(working, 0, working.Length)
  26351. If n > 0 Then
  26352. output.Write(working, 0, n)
  26353. End IF
  26354. Loop While (n > 0)
  26355. End Using
  26356. End Using
  26357. End Using
  26358. End Sub
  26359. </code>
  26360. </example>
  26361. <param name="stream">The stream which will be read or written.</param>
  26362. <param name="mode">Indicates whether the GZipStream will compress or decompress.</param>
  26363. </member>
  26364. <member name="M:Best.HTTP.Shared.Compression.Zlib.GZipStream.#ctor(System.IO.Stream,Best.HTTP.Shared.Compression.Zlib.CompressionMode,Best.HTTP.Shared.Compression.Zlib.CompressionLevel)">
  26365. <summary>
  26366. Create a <c>GZipStream</c> using the specified <c>CompressionMode</c> and
  26367. the specified <c>CompressionLevel</c>.
  26368. </summary>
  26369. <remarks>
  26370. <para>
  26371. The <c>CompressionMode</c> (Compress or Decompress) also establishes the
  26372. "direction" of the stream. A <c>GZipStream</c> with
  26373. <c>CompressionMode.Compress</c> works only through <c>Write()</c>. A
  26374. <c>GZipStream</c> with <c>CompressionMode.Decompress</c> works only
  26375. through <c>Read()</c>.
  26376. </para>
  26377. </remarks>
  26378. <example>
  26379. This example shows how to use a <c>GZipStream</c> to compress a file into a .gz file.
  26380. <code>
  26381. using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress))
  26382. {
  26383. using (var raw = System.IO.File.Create(fileToCompress + ".gz"))
  26384. {
  26385. using (Stream compressor = new GZipStream(raw,
  26386. CompressionMode.Compress,
  26387. CompressionLevel.BestCompression))
  26388. {
  26389. byte[] buffer = new byte[WORKING_BUFFER_SIZE];
  26390. int n;
  26391. while ((n= input.Read(buffer, 0, buffer.Length)) != 0)
  26392. {
  26393. compressor.Write(buffer, 0, n);
  26394. }
  26395. }
  26396. }
  26397. }
  26398. </code>
  26399. <code lang="VB">
  26400. Using input As Stream = File.OpenRead(fileToCompress)
  26401. Using raw As FileStream = File.Create(fileToCompress &amp; ".gz")
  26402. Using compressor As Stream = New GZipStream(raw, CompressionMode.Compress, CompressionLevel.BestCompression)
  26403. Dim buffer As Byte() = New Byte(4096) {}
  26404. Dim n As Integer = -1
  26405. Do While (n &lt;&gt; 0)
  26406. If (n &gt; 0) Then
  26407. compressor.Write(buffer, 0, n)
  26408. End If
  26409. n = input.Read(buffer, 0, buffer.Length)
  26410. Loop
  26411. End Using
  26412. End Using
  26413. End Using
  26414. </code>
  26415. </example>
  26416. <param name="stream">The stream to be read or written while deflating or inflating.</param>
  26417. <param name="mode">Indicates whether the <c>GZipStream</c> will compress or decompress.</param>
  26418. <param name="level">A tuning knob to trade speed for effectiveness.</param>
  26419. </member>
  26420. <member name="M:Best.HTTP.Shared.Compression.Zlib.GZipStream.#ctor(System.IO.Stream,Best.HTTP.Shared.Compression.Zlib.CompressionMode,System.Boolean)">
  26421. <summary>
  26422. Create a <c>GZipStream</c> using the specified <c>CompressionMode</c>, and
  26423. explicitly specify whether the stream should be left open after Deflation
  26424. or Inflation.
  26425. </summary>
  26426. <remarks>
  26427. <para>
  26428. This constructor allows the application to request that the captive stream
  26429. remain open after the deflation or inflation occurs. By default, after
  26430. <c>Close()</c> is called on the stream, the captive stream is also
  26431. closed. In some cases this is not desired, for example if the stream is a
  26432. memory stream that will be re-read after compressed data has been written
  26433. to it. Specify true for the <paramref name="leaveOpen"/> parameter to leave
  26434. the stream open.
  26435. </para>
  26436. <para>
  26437. The <see cref="T:Best.HTTP.Shared.Compression.Zlib.CompressionMode"/> (Compress or Decompress) also
  26438. establishes the "direction" of the stream. A <c>GZipStream</c> with
  26439. <c>CompressionMode.Compress</c> works only through <c>Write()</c>. A <c>GZipStream</c>
  26440. with <c>CompressionMode.Decompress</c> works only through <c>Read()</c>.
  26441. </para>
  26442. <para>
  26443. The <c>GZipStream</c> will use the default compression level. If you want
  26444. to specify the compression level, see <see cref="M:Best.HTTP.Shared.Compression.Zlib.GZipStream.#ctor(System.IO.Stream,Best.HTTP.Shared.Compression.Zlib.CompressionMode,Best.HTTP.Shared.Compression.Zlib.CompressionLevel,System.Boolean)"/>.
  26445. </para>
  26446. <para>
  26447. See the other overloads of this constructor for example code.
  26448. </para>
  26449. </remarks>
  26450. <param name="stream">
  26451. The stream which will be read or written. This is called the "captive"
  26452. stream in other places in this documentation.
  26453. </param>
  26454. <param name="mode">Indicates whether the GZipStream will compress or decompress.
  26455. </param>
  26456. <param name="leaveOpen">
  26457. true if the application would like the base stream to remain open after
  26458. inflation/deflation.
  26459. </param>
  26460. </member>
  26461. <member name="M:Best.HTTP.Shared.Compression.Zlib.GZipStream.#ctor(System.IO.Stream,Best.HTTP.Shared.Compression.Zlib.CompressionMode,Best.HTTP.Shared.Compression.Zlib.CompressionLevel,System.Boolean)">
  26462. <summary>
  26463. Create a <c>GZipStream</c> using the specified <c>CompressionMode</c> and the
  26464. specified <c>CompressionLevel</c>, and explicitly specify whether the
  26465. stream should be left open after Deflation or Inflation.
  26466. </summary>
  26467. <remarks>
  26468. <para>
  26469. This constructor allows the application to request that the captive stream
  26470. remain open after the deflation or inflation occurs. By default, after
  26471. <c>Close()</c> is called on the stream, the captive stream is also
  26472. closed. In some cases this is not desired, for example if the stream is a
  26473. memory stream that will be re-read after compressed data has been written
  26474. to it. Specify true for the <paramref name="leaveOpen"/> parameter to
  26475. leave the stream open.
  26476. </para>
  26477. <para>
  26478. As noted in the class documentation, the <c>CompressionMode</c> (Compress
  26479. or Decompress) also establishes the "direction" of the stream. A
  26480. <c>GZipStream</c> with <c>CompressionMode.Compress</c> works only through
  26481. <c>Write()</c>. A <c>GZipStream</c> with <c>CompressionMode.Decompress</c> works only
  26482. through <c>Read()</c>.
  26483. </para>
  26484. </remarks>
  26485. <example>
  26486. This example shows how to use a <c>GZipStream</c> to compress data.
  26487. <code>
  26488. using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress))
  26489. {
  26490. using (var raw = System.IO.File.Create(outputFile))
  26491. {
  26492. using (Stream compressor = new GZipStream(raw, CompressionMode.Compress, CompressionLevel.BestCompression, true))
  26493. {
  26494. byte[] buffer = new byte[WORKING_BUFFER_SIZE];
  26495. int n;
  26496. while ((n= input.Read(buffer, 0, buffer.Length)) != 0)
  26497. {
  26498. compressor.Write(buffer, 0, n);
  26499. }
  26500. }
  26501. }
  26502. }
  26503. </code>
  26504. <code lang="VB">
  26505. Dim outputFile As String = (fileToCompress &amp; ".compressed")
  26506. Using input As Stream = File.OpenRead(fileToCompress)
  26507. Using raw As FileStream = File.Create(outputFile)
  26508. Using compressor As Stream = New GZipStream(raw, CompressionMode.Compress, CompressionLevel.BestCompression, True)
  26509. Dim buffer As Byte() = New Byte(4096) {}
  26510. Dim n As Integer = -1
  26511. Do While (n &lt;&gt; 0)
  26512. If (n &gt; 0) Then
  26513. compressor.Write(buffer, 0, n)
  26514. End If
  26515. n = input.Read(buffer, 0, buffer.Length)
  26516. Loop
  26517. End Using
  26518. End Using
  26519. End Using
  26520. </code>
  26521. </example>
  26522. <param name="stream">The stream which will be read or written.</param>
  26523. <param name="mode">Indicates whether the GZipStream will compress or decompress.</param>
  26524. <param name="leaveOpen">true if the application would like the stream to remain open after inflation/deflation.</param>
  26525. <param name="level">A tuning knob to trade speed for effectiveness.</param>
  26526. </member>
  26527. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.FlushMode">
  26528. <summary>
  26529. This property sets the flush behavior on the stream.
  26530. </summary>
  26531. </member>
  26532. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.BufferSize">
  26533. <summary>
  26534. The size of the working buffer for the compression codec.
  26535. </summary>
  26536. <remarks>
  26537. <para>
  26538. The working buffer is used for all stream operations. The default size is
  26539. 1024 bytes. The minimum size is 128 bytes. You may get better performance
  26540. with a larger buffer. Then again, you might not. You would have to test
  26541. it.
  26542. </para>
  26543. <para>
  26544. Set this before the first call to <c>Read()</c> or <c>Write()</c> on the
  26545. stream. If you try to set it afterwards, it will throw.
  26546. </para>
  26547. </remarks>
  26548. </member>
  26549. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.TotalIn">
  26550. <summary> Returns the total number of bytes input so far.</summary>
  26551. </member>
  26552. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.TotalOut">
  26553. <summary> Returns the total number of bytes output so far.</summary>
  26554. </member>
  26555. <member name="M:Best.HTTP.Shared.Compression.Zlib.GZipStream.Dispose(System.Boolean)">
  26556. <summary>
  26557. Dispose the stream.
  26558. </summary>
  26559. <remarks>
  26560. <para>
  26561. This may or may not result in a <c>Close()</c> call on the captive
  26562. stream. See the constructors that have a <c>leaveOpen</c> parameter
  26563. for more information.
  26564. </para>
  26565. <para>
  26566. This method may be invoked in two distinct scenarios. If disposing
  26567. == true, the method has been called directly or indirectly by a
  26568. user's code, for example via the public Dispose() method. In this
  26569. case, both managed and unmanaged resources can be referenced and
  26570. disposed. If disposing == false, the method has been called by the
  26571. runtime from inside the object finalizer and this method should not
  26572. reference other objects; in that case only unmanaged resources must
  26573. be referenced or disposed.
  26574. </para>
  26575. </remarks>
  26576. <param name="disposing">
  26577. indicates whether the Dispose method was invoked by user code.
  26578. </param>
  26579. </member>
  26580. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.CanRead">
  26581. <summary>
  26582. Indicates whether the stream can be read.
  26583. </summary>
  26584. <remarks>
  26585. The return value depends on whether the captive stream supports reading.
  26586. </remarks>
  26587. </member>
  26588. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.CanSeek">
  26589. <summary>
  26590. Indicates whether the stream supports Seek operations.
  26591. </summary>
  26592. <remarks>
  26593. Always returns false.
  26594. </remarks>
  26595. </member>
  26596. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.CanWrite">
  26597. <summary>
  26598. Indicates whether the stream can be written.
  26599. </summary>
  26600. <remarks>
  26601. The return value depends on whether the captive stream supports writing.
  26602. </remarks>
  26603. </member>
  26604. <member name="M:Best.HTTP.Shared.Compression.Zlib.GZipStream.Flush">
  26605. <summary>
  26606. Flush the stream.
  26607. </summary>
  26608. </member>
  26609. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.Length">
  26610. <summary>
  26611. Reading this property always throws a <see cref="T:System.NotImplementedException"/>.
  26612. </summary>
  26613. </member>
  26614. <member name="P:Best.HTTP.Shared.Compression.Zlib.GZipStream.Position">
  26615. <summary>
  26616. The position of the stream pointer.
  26617. </summary>
  26618. <remarks>
  26619. Setting this property always throws a <see
  26620. cref="T:System.NotImplementedException"/>. Reading will return the total bytes
  26621. written out, if used in writing, or the total bytes read in, if used in
  26622. reading. The count may refer to compressed bytes or uncompressed bytes,
  26623. depending on how you've used the stream.
  26624. </remarks>
  26625. </member>
  26626. <member name="M:Best.HTTP.Shared.Compression.Zlib.GZipStream.Read(System.Byte[],System.Int32,System.Int32)">
  26627. <summary>
  26628. Read and decompress data from the source stream.
  26629. </summary>
  26630. <remarks>
  26631. With a <c>GZipStream</c>, decompression is done through reading.
  26632. </remarks>
  26633. <example>
  26634. <code>
  26635. byte[] working = new byte[WORKING_BUFFER_SIZE];
  26636. using (System.IO.Stream input = System.IO.File.OpenRead(_CompressedFile))
  26637. {
  26638. using (Stream decompressor= new Ionic.Zlib.GZipStream(input, CompressionMode.Decompress, true))
  26639. {
  26640. using (var output = System.IO.File.Create(_DecompressedFile))
  26641. {
  26642. int n;
  26643. while ((n= decompressor.Read(working, 0, working.Length)) !=0)
  26644. {
  26645. output.Write(working, 0, n);
  26646. }
  26647. }
  26648. }
  26649. }
  26650. </code>
  26651. </example>
  26652. <param name="buffer">The buffer into which the decompressed data should be placed.</param>
  26653. <param name="offset">the offset within that data array to put the first byte read.</param>
  26654. <param name="count">the number of bytes to read.</param>
  26655. <returns>the number of bytes actually read</returns>
  26656. </member>
  26657. <member name="M:Best.HTTP.Shared.Compression.Zlib.GZipStream.Seek(System.Int64,System.IO.SeekOrigin)">
  26658. <summary>
  26659. Calling this method always throws a <see cref="T:System.NotImplementedException"/>.
  26660. </summary>
  26661. <param name="offset">irrelevant; it will always throw!</param>
  26662. <param name="origin">irrelevant; it will always throw!</param>
  26663. <returns>irrelevant!</returns>
  26664. </member>
  26665. <member name="M:Best.HTTP.Shared.Compression.Zlib.GZipStream.SetLength(System.Int64)">
  26666. <summary>
  26667. Calling this method always throws a <see cref="T:System.NotImplementedException"/>.
  26668. </summary>
  26669. <param name="value">irrelevant; this method will always throw!</param>
  26670. </member>
  26671. <member name="M:Best.HTTP.Shared.Compression.Zlib.GZipStream.Write(System.Byte[],System.Int32,System.Int32)">
  26672. <summary>
  26673. Write data to the stream.
  26674. </summary>
  26675. <remarks>
  26676. <para>
  26677. If you wish to use the <c>GZipStream</c> to compress data while writing,
  26678. you can create a <c>GZipStream</c> with <c>CompressionMode.Compress</c>, and a
  26679. writable output stream. Then call <c>Write()</c> on that <c>GZipStream</c>,
  26680. providing uncompressed data as input. The data sent to the output stream
  26681. will be the compressed form of the data written.
  26682. </para>
  26683. <para>
  26684. A <c>GZipStream</c> can be used for <c>Read()</c> or <c>Write()</c>, but not
  26685. both. Writing implies compression. Reading implies decompression.
  26686. </para>
  26687. </remarks>
  26688. <param name="buffer">The buffer holding data to write to the stream.</param>
  26689. <param name="offset">the offset within that data array to find the first byte to write.</param>
  26690. <param name="count">the number of bytes to write.</param>
  26691. </member>
  26692. <member name="T:Best.HTTP.Shared.Compression.Zlib.FlushType">
  26693. <summary>
  26694. Describes how to flush the current deflate operation.
  26695. </summary>
  26696. <remarks>
  26697. The different FlushType values are useful when using a Deflate in a streaming application.
  26698. </remarks>
  26699. </member>
  26700. <member name="F:Best.HTTP.Shared.Compression.Zlib.FlushType.None">
  26701. <summary>No flush at all.</summary>
  26702. </member>
  26703. <member name="F:Best.HTTP.Shared.Compression.Zlib.FlushType.Partial">
  26704. <summary>Closes the current block, but doesn't flush it to
  26705. the output. Used internally only in hypothetical
  26706. scenarios. This was supposed to be removed by Zlib, but it is
  26707. still in use in some edge cases.
  26708. </summary>
  26709. </member>
  26710. <member name="F:Best.HTTP.Shared.Compression.Zlib.FlushType.Sync">
  26711. <summary>
  26712. Use this during compression to specify that all pending output should be
  26713. flushed to the output buffer and the output should be aligned on a byte
  26714. boundary. You might use this in a streaming communication scenario, so that
  26715. the decompressor can get all input data available so far. When using this
  26716. with a ZlibCodec, <c>AvailableBytesIn</c> will be zero after the call if
  26717. enough output space has been provided before the call. Flushing will
  26718. degrade compression and so it should be used only when necessary.
  26719. </summary>
  26720. </member>
  26721. <member name="F:Best.HTTP.Shared.Compression.Zlib.FlushType.Full">
  26722. <summary>
  26723. Use this during compression to specify that all output should be flushed, as
  26724. with <c>FlushType.Sync</c>, but also, the compression state should be reset
  26725. so that decompression can restart from this point if previous compressed
  26726. data has been damaged or if random access is desired. Using
  26727. <c>FlushType.Full</c> too often can significantly degrade the compression.
  26728. </summary>
  26729. </member>
  26730. <member name="F:Best.HTTP.Shared.Compression.Zlib.FlushType.Finish">
  26731. <summary>Signals the end of the compression/decompression stream.</summary>
  26732. </member>
  26733. <member name="T:Best.HTTP.Shared.Compression.Zlib.CompressionLevel">
  26734. <summary>
  26735. The compression level to be used when using a DeflateStream or ZlibStream with CompressionMode.Compress.
  26736. </summary>
  26737. </member>
  26738. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.None">
  26739. <summary>
  26740. None means that the data will be simply stored, with no change at all.
  26741. If you are producing ZIPs for use on Mac OSX, be aware that archives produced with CompressionLevel.None
  26742. cannot be opened with the default zip reader. Use a different CompressionLevel.
  26743. </summary>
  26744. </member>
  26745. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.Level0">
  26746. <summary>
  26747. Same as None.
  26748. </summary>
  26749. </member>
  26750. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.BestSpeed">
  26751. <summary>
  26752. The fastest but least effective compression.
  26753. </summary>
  26754. </member>
  26755. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.Level1">
  26756. <summary>
  26757. A synonym for BestSpeed.
  26758. </summary>
  26759. </member>
  26760. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.Level2">
  26761. <summary>
  26762. A little slower, but better, than level 1.
  26763. </summary>
  26764. </member>
  26765. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.Level3">
  26766. <summary>
  26767. A little slower, but better, than level 2.
  26768. </summary>
  26769. </member>
  26770. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.Level4">
  26771. <summary>
  26772. A little slower, but better, than level 3.
  26773. </summary>
  26774. </member>
  26775. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.Level5">
  26776. <summary>
  26777. A little slower than level 4, but with better compression.
  26778. </summary>
  26779. </member>
  26780. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.Default">
  26781. <summary>
  26782. The default compression level, with a good balance of speed and compression efficiency.
  26783. </summary>
  26784. </member>
  26785. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.Level6">
  26786. <summary>
  26787. A synonym for Default.
  26788. </summary>
  26789. </member>
  26790. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.Level7">
  26791. <summary>
  26792. Pretty good compression!
  26793. </summary>
  26794. </member>
  26795. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.Level8">
  26796. <summary>
  26797. Better compression than Level7!
  26798. </summary>
  26799. </member>
  26800. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.BestCompression">
  26801. <summary>
  26802. The "best" compression, where best means greatest reduction in size of the input data stream.
  26803. This is also the slowest compression.
  26804. </summary>
  26805. </member>
  26806. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionLevel.Level9">
  26807. <summary>
  26808. A synonym for BestCompression.
  26809. </summary>
  26810. </member>
  26811. <member name="T:Best.HTTP.Shared.Compression.Zlib.CompressionStrategy">
  26812. <summary>
  26813. Describes options for how the compression algorithm is executed. Different strategies
  26814. work better on different sorts of data. The strategy parameter can affect the compression
  26815. ratio and the speed of compression but not the correctness of the compresssion.
  26816. </summary>
  26817. </member>
  26818. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionStrategy.Default">
  26819. <summary>
  26820. The default strategy is probably the best for normal data.
  26821. </summary>
  26822. </member>
  26823. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionStrategy.Filtered">
  26824. <summary>
  26825. The <c>Filtered</c> strategy is intended to be used most effectively with data produced by a
  26826. filter or predictor. By this definition, filtered data consists mostly of small
  26827. values with a somewhat random distribution. In this case, the compression algorithm
  26828. is tuned to compress them better. The effect of <c>Filtered</c> is to force more Huffman
  26829. coding and less string matching; it is a half-step between <c>Default</c> and <c>HuffmanOnly</c>.
  26830. </summary>
  26831. </member>
  26832. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionStrategy.HuffmanOnly">
  26833. <summary>
  26834. Using <c>HuffmanOnly</c> will force the compressor to do Huffman encoding only, with no
  26835. string matching.
  26836. </summary>
  26837. </member>
  26838. <member name="T:Best.HTTP.Shared.Compression.Zlib.CompressionMode">
  26839. <summary>
  26840. An enum to specify the direction of transcoding - whether to compress or decompress.
  26841. </summary>
  26842. </member>
  26843. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionMode.Compress">
  26844. <summary>
  26845. Used to specify that the stream should compress the data.
  26846. </summary>
  26847. </member>
  26848. <member name="F:Best.HTTP.Shared.Compression.Zlib.CompressionMode.Decompress">
  26849. <summary>
  26850. Used to specify that the stream should decompress the data.
  26851. </summary>
  26852. </member>
  26853. <member name="T:Best.HTTP.Shared.Compression.Zlib.ZlibException">
  26854. <summary>
  26855. A general purpose exception class for exceptions in the Zlib library.
  26856. </summary>
  26857. </member>
  26858. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibException.#ctor">
  26859. <summary>
  26860. The ZlibException class captures exception information generated
  26861. by the Zlib library.
  26862. </summary>
  26863. </member>
  26864. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibException.#ctor(System.String)">
  26865. <summary>
  26866. This ctor collects a message attached to the exception.
  26867. </summary>
  26868. <param name="s">the message for the exception.</param>
  26869. </member>
  26870. <member name="M:Best.HTTP.Shared.Compression.Zlib.SharedUtils.URShift(System.Int32,System.Int32)">
  26871. <summary>
  26872. Performs an unsigned bitwise right shift with the specified number
  26873. </summary>
  26874. <param name="number">Number to operate on</param>
  26875. <param name="bits">Ammount of bits to shift</param>
  26876. <returns>The resulting number from the shift operation</returns>
  26877. </member>
  26878. <member name="M:Best.HTTP.Shared.Compression.Zlib.SharedUtils.ReadInput(System.IO.TextReader,System.Byte[],System.Int32,System.Int32)">
  26879. <summary>
  26880. Reads a number of characters from the current source TextReader and writes
  26881. the data to the target array at the specified index.
  26882. </summary>
  26883. <param name="sourceTextReader">The source TextReader to read from</param>
  26884. <param name="target">Contains the array of characteres read from the source TextReader.</param>
  26885. <param name="start">The starting index of the target array.</param>
  26886. <param name="count">The maximum number of characters to read from the source TextReader.</param>
  26887. <returns>
  26888. The number of characters read. The number will be less than or equal to
  26889. count depending on the data available in the source TextReader. Returns -1
  26890. if the end of the stream is reached.
  26891. </returns>
  26892. </member>
  26893. <member name="T:Best.HTTP.Shared.Compression.Zlib.Adler">
  26894. <summary>
  26895. Computes an Adler-32 checksum.
  26896. </summary>
  26897. <remarks>
  26898. The Adler checksum is similar to a CRC checksum, but faster to compute, though less
  26899. reliable. It is used in producing RFC1950 compressed streams. The Adler checksum
  26900. is a required part of the "ZLIB" standard. Applications will almost never need to
  26901. use this class directly.
  26902. </remarks>
  26903. <exclude/>
  26904. </member>
  26905. <member name="M:Best.HTTP.Shared.Compression.Zlib.Adler.Adler32(System.UInt32,System.Byte[],System.Int32,System.Int32)">
  26906. <summary>
  26907. Calculates the Adler32 checksum.
  26908. </summary>
  26909. <remarks>
  26910. <para>
  26911. This is used within ZLIB. You probably don't need to use this directly.
  26912. </para>
  26913. </remarks>
  26914. <example>
  26915. To compute an Adler32 checksum on a byte array:
  26916. <code>
  26917. var adler = Adler.Adler32(0, null, 0, 0);
  26918. adler = Adler.Adler32(adler, buffer, index, length);
  26919. </code>
  26920. </example>
  26921. </member>
  26922. <member name="T:Best.HTTP.Shared.Compression.Zlib.ZlibCodec">
  26923. <summary>
  26924. Encoder and Decoder for ZLIB and DEFLATE (IETF RFC1950 and RFC1951).
  26925. </summary>
  26926. <remarks>
  26927. This class compresses and decompresses data according to the Deflate algorithm
  26928. and optionally, the ZLIB format, as documented in <see
  26929. href="http://www.ietf.org/rfc/rfc1950.txt">RFC 1950 - ZLIB</see> and <see
  26930. href="http://www.ietf.org/rfc/rfc1951.txt">RFC 1951 - DEFLATE</see>.
  26931. </remarks>
  26932. </member>
  26933. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.InputBuffer">
  26934. <summary>
  26935. The buffer from which data is taken.
  26936. </summary>
  26937. </member>
  26938. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.NextIn">
  26939. <summary>
  26940. An index into the InputBuffer array, indicating where to start reading.
  26941. </summary>
  26942. </member>
  26943. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.AvailableBytesIn">
  26944. <summary>
  26945. The number of bytes available in the InputBuffer, starting at NextIn.
  26946. </summary>
  26947. <remarks>
  26948. Generally you should set this to InputBuffer.Length before the first Inflate() or Deflate() call.
  26949. The class will update this number as calls to Inflate/Deflate are made.
  26950. </remarks>
  26951. </member>
  26952. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.TotalBytesIn">
  26953. <summary>
  26954. Total number of bytes read so far, through all calls to Inflate()/Deflate().
  26955. </summary>
  26956. </member>
  26957. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.OutputBuffer">
  26958. <summary>
  26959. Buffer to store output data.
  26960. </summary>
  26961. </member>
  26962. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.NextOut">
  26963. <summary>
  26964. An index into the OutputBuffer array, indicating where to start writing.
  26965. </summary>
  26966. </member>
  26967. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.AvailableBytesOut">
  26968. <summary>
  26969. The number of bytes available in the OutputBuffer, starting at NextOut.
  26970. </summary>
  26971. <remarks>
  26972. Generally you should set this to OutputBuffer.Length before the first Inflate() or Deflate() call.
  26973. The class will update this number as calls to Inflate/Deflate are made.
  26974. </remarks>
  26975. </member>
  26976. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.TotalBytesOut">
  26977. <summary>
  26978. Total number of bytes written to the output so far, through all calls to Inflate()/Deflate().
  26979. </summary>
  26980. </member>
  26981. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.Message">
  26982. <summary>
  26983. used for diagnostics, when something goes wrong!
  26984. </summary>
  26985. </member>
  26986. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.CompressLevel">
  26987. <summary>
  26988. The compression level to use in this codec. Useful only in compression mode.
  26989. </summary>
  26990. </member>
  26991. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.WindowBits">
  26992. <summary>
  26993. The number of Window Bits to use.
  26994. </summary>
  26995. <remarks>
  26996. This gauges the size of the sliding window, and hence the
  26997. compression effectiveness as well as memory consumption. It's best to just leave this
  26998. setting alone if you don't know what it is. The maximum value is 15 bits, which implies
  26999. a 32k window.
  27000. </remarks>
  27001. </member>
  27002. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.Strategy">
  27003. <summary>
  27004. The compression strategy to use.
  27005. </summary>
  27006. <remarks>
  27007. This is only effective in compression. The theory offered by ZLIB is that different
  27008. strategies could potentially produce significant differences in compression behavior
  27009. for different data sets. Unfortunately I don't have any good recommendations for how
  27010. to set it differently. When I tested changing the strategy I got minimally different
  27011. compression performance. It's best to leave this property alone if you don't have a
  27012. good feel for it. Or, you may want to produce a test harness that runs through the
  27013. different strategy options and evaluates them on different file types. If you do that,
  27014. let me know your results.
  27015. </remarks>
  27016. </member>
  27017. <member name="P:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.Adler32">
  27018. <summary>
  27019. The Adler32 checksum on the data transferred through the codec so far. You probably don't need to look at this.
  27020. </summary>
  27021. </member>
  27022. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.#ctor">
  27023. <summary>
  27024. Create a ZlibCodec.
  27025. </summary>
  27026. <remarks>
  27027. If you use this default constructor, you will later have to explicitly call
  27028. InitializeInflate() or InitializeDeflate() before using the ZlibCodec to compress
  27029. or decompress.
  27030. </remarks>
  27031. </member>
  27032. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.#ctor(Best.HTTP.Shared.Compression.Zlib.CompressionMode)">
  27033. <summary>
  27034. Create a ZlibCodec that either compresses or decompresses.
  27035. </summary>
  27036. <param name="mode">
  27037. Indicates whether the codec should compress (deflate) or decompress (inflate).
  27038. </param>
  27039. </member>
  27040. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.InitializeInflate">
  27041. <summary>
  27042. Initialize the inflation state.
  27043. </summary>
  27044. <remarks>
  27045. It is not necessary to call this before using the ZlibCodec to inflate data;
  27046. It is implicitly called when you call the constructor.
  27047. </remarks>
  27048. <returns>Z_OK if everything goes well.</returns>
  27049. </member>
  27050. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.InitializeInflate(System.Boolean)">
  27051. <summary>
  27052. Initialize the inflation state with an explicit flag to
  27053. govern the handling of RFC1950 header bytes.
  27054. </summary>
  27055. <remarks>
  27056. By default, the ZLIB header defined in <see
  27057. href="http://www.ietf.org/rfc/rfc1950.txt">RFC 1950</see> is expected. If
  27058. you want to read a zlib stream you should specify true for
  27059. expectRfc1950Header. If you have a deflate stream, you will want to specify
  27060. false. It is only necessary to invoke this initializer explicitly if you
  27061. want to specify false.
  27062. </remarks>
  27063. <param name="expectRfc1950Header">whether to expect an RFC1950 header byte
  27064. pair when reading the stream of data to be inflated.</param>
  27065. <returns>Z_OK if everything goes well.</returns>
  27066. </member>
  27067. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.InitializeInflate(System.Int32)">
  27068. <summary>
  27069. Initialize the ZlibCodec for inflation, with the specified number of window bits.
  27070. </summary>
  27071. <param name="windowBits">The number of window bits to use. If you need to ask what that is,
  27072. then you shouldn't be calling this initializer.</param>
  27073. <returns>Z_OK if all goes well.</returns>
  27074. </member>
  27075. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.InitializeInflate(System.Int32,System.Boolean)">
  27076. <summary>
  27077. Initialize the inflation state with an explicit flag to govern the handling of
  27078. RFC1950 header bytes.
  27079. </summary>
  27080. <remarks>
  27081. If you want to read a zlib stream you should specify true for
  27082. expectRfc1950Header. In this case, the library will expect to find a ZLIB
  27083. header, as defined in <see href="http://www.ietf.org/rfc/rfc1950.txt">RFC
  27084. 1950</see>, in the compressed stream. If you will be reading a DEFLATE or
  27085. GZIP stream, which does not have such a header, you will want to specify
  27086. false.
  27087. </remarks>
  27088. <param name="expectRfc1950Header">whether to expect an RFC1950 header byte pair when reading
  27089. the stream of data to be inflated.</param>
  27090. <param name="windowBits">The number of window bits to use. If you need to ask what that is,
  27091. then you shouldn't be calling this initializer.</param>
  27092. <returns>Z_OK if everything goes well.</returns>
  27093. </member>
  27094. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.Inflate(Best.HTTP.Shared.Compression.Zlib.FlushType)">
  27095. <summary>
  27096. Inflate the data in the InputBuffer, placing the result in the OutputBuffer.
  27097. </summary>
  27098. <remarks>
  27099. You must have set InputBuffer and OutputBuffer, NextIn and NextOut, and AvailableBytesIn and
  27100. AvailableBytesOut before calling this method.
  27101. </remarks>
  27102. <example>
  27103. <code>
  27104. private void InflateBuffer()
  27105. {
  27106. int bufferSize = 1024;
  27107. byte[] buffer = new byte[bufferSize];
  27108. ZlibCodec decompressor = new ZlibCodec();
  27109. Console.WriteLine("\n============================================");
  27110. Console.WriteLine("Size of Buffer to Inflate: {0} bytes.", CompressedBytes.Length);
  27111. MemoryStream ms = new MemoryStream(DecompressedBytes);
  27112. int rc = decompressor.InitializeInflate();
  27113. decompressor.InputBuffer = CompressedBytes;
  27114. decompressor.NextIn = 0;
  27115. decompressor.AvailableBytesIn = CompressedBytes.Length;
  27116. decompressor.OutputBuffer = buffer;
  27117. // pass 1: inflate
  27118. do
  27119. {
  27120. decompressor.NextOut = 0;
  27121. decompressor.AvailableBytesOut = buffer.Length;
  27122. rc = decompressor.Inflate(FlushType.None);
  27123. if (rc != ZlibConstants.Z_OK &amp;&amp; rc != ZlibConstants.Z_STREAM_END)
  27124. throw new Exception("inflating: " + decompressor.Message);
  27125. ms.Write(decompressor.OutputBuffer, 0, buffer.Length - decompressor.AvailableBytesOut);
  27126. }
  27127. while (decompressor.AvailableBytesIn &gt; 0 || decompressor.AvailableBytesOut == 0);
  27128. // pass 2: finish and flush
  27129. do
  27130. {
  27131. decompressor.NextOut = 0;
  27132. decompressor.AvailableBytesOut = buffer.Length;
  27133. rc = decompressor.Inflate(FlushType.Finish);
  27134. if (rc != ZlibConstants.Z_STREAM_END &amp;&amp; rc != ZlibConstants.Z_OK)
  27135. throw new Exception("inflating: " + decompressor.Message);
  27136. if (buffer.Length - decompressor.AvailableBytesOut &gt; 0)
  27137. ms.Write(buffer, 0, buffer.Length - decompressor.AvailableBytesOut);
  27138. }
  27139. while (decompressor.AvailableBytesIn &gt; 0 || decompressor.AvailableBytesOut == 0);
  27140. decompressor.EndInflate();
  27141. }
  27142. </code>
  27143. </example>
  27144. <param name="flush">The flush to use when inflating.</param>
  27145. <returns>Z_OK if everything goes well.</returns>
  27146. </member>
  27147. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.EndInflate">
  27148. <summary>
  27149. Ends an inflation session.
  27150. </summary>
  27151. <remarks>
  27152. Call this after successively calling Inflate(). This will cause all buffers to be flushed.
  27153. After calling this you cannot call Inflate() without a intervening call to one of the
  27154. InitializeInflate() overloads.
  27155. </remarks>
  27156. <returns>Z_OK if everything goes well.</returns>
  27157. </member>
  27158. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.SyncInflate">
  27159. <summary>
  27160. I don't know what this does!
  27161. </summary>
  27162. <returns>Z_OK if everything goes well.</returns>
  27163. </member>
  27164. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.InitializeDeflate">
  27165. <summary>
  27166. Initialize the ZlibCodec for deflation operation.
  27167. </summary>
  27168. <remarks>
  27169. The codec will use the MAX window bits and the default level of compression.
  27170. </remarks>
  27171. <example>
  27172. <code>
  27173. int bufferSize = 40000;
  27174. byte[] CompressedBytes = new byte[bufferSize];
  27175. byte[] DecompressedBytes = new byte[bufferSize];
  27176. ZlibCodec compressor = new ZlibCodec();
  27177. compressor.InitializeDeflate(CompressionLevel.Default);
  27178. compressor.InputBuffer = System.Text.ASCIIEncoding.ASCII.GetBytes(TextToCompress);
  27179. compressor.NextIn = 0;
  27180. compressor.AvailableBytesIn = compressor.InputBuffer.Length;
  27181. compressor.OutputBuffer = CompressedBytes;
  27182. compressor.NextOut = 0;
  27183. compressor.AvailableBytesOut = CompressedBytes.Length;
  27184. while (compressor.TotalBytesIn != TextToCompress.Length &amp;&amp; compressor.TotalBytesOut &lt; bufferSize)
  27185. {
  27186. compressor.Deflate(FlushType.None);
  27187. }
  27188. while (true)
  27189. {
  27190. int rc= compressor.Deflate(FlushType.Finish);
  27191. if (rc == ZlibConstants.Z_STREAM_END) break;
  27192. }
  27193. compressor.EndDeflate();
  27194. </code>
  27195. </example>
  27196. <returns>Z_OK if all goes well. You generally don't need to check the return code.</returns>
  27197. </member>
  27198. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.InitializeDeflate(Best.HTTP.Shared.Compression.Zlib.CompressionLevel)">
  27199. <summary>
  27200. Initialize the ZlibCodec for deflation operation, using the specified CompressionLevel.
  27201. </summary>
  27202. <remarks>
  27203. The codec will use the maximum window bits (15) and the specified
  27204. CompressionLevel. It will emit a ZLIB stream as it compresses.
  27205. </remarks>
  27206. <param name="level">The compression level for the codec.</param>
  27207. <returns>Z_OK if all goes well.</returns>
  27208. </member>
  27209. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.InitializeDeflate(Best.HTTP.Shared.Compression.Zlib.CompressionLevel,System.Boolean)">
  27210. <summary>
  27211. Initialize the ZlibCodec for deflation operation, using the specified CompressionLevel,
  27212. and the explicit flag governing whether to emit an RFC1950 header byte pair.
  27213. </summary>
  27214. <remarks>
  27215. The codec will use the maximum window bits (15) and the specified CompressionLevel.
  27216. If you want to generate a zlib stream, you should specify true for
  27217. wantRfc1950Header. In this case, the library will emit a ZLIB
  27218. header, as defined in <see href="http://www.ietf.org/rfc/rfc1950.txt">RFC
  27219. 1950</see>, in the compressed stream.
  27220. </remarks>
  27221. <param name="level">The compression level for the codec.</param>
  27222. <param name="wantRfc1950Header">whether to emit an initial RFC1950 byte pair in the compressed stream.</param>
  27223. <returns>Z_OK if all goes well.</returns>
  27224. </member>
  27225. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.InitializeDeflate(Best.HTTP.Shared.Compression.Zlib.CompressionLevel,System.Int32)">
  27226. <summary>
  27227. Initialize the ZlibCodec for deflation operation, using the specified CompressionLevel,
  27228. and the specified number of window bits.
  27229. </summary>
  27230. <remarks>
  27231. The codec will use the specified number of window bits and the specified CompressionLevel.
  27232. </remarks>
  27233. <param name="level">The compression level for the codec.</param>
  27234. <param name="bits">the number of window bits to use. If you don't know what this means, don't use this method.</param>
  27235. <returns>Z_OK if all goes well.</returns>
  27236. </member>
  27237. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.InitializeDeflate(Best.HTTP.Shared.Compression.Zlib.CompressionLevel,System.Int32,System.Boolean)">
  27238. <summary>
  27239. Initialize the ZlibCodec for deflation operation, using the specified
  27240. CompressionLevel, the specified number of window bits, and the explicit flag
  27241. governing whether to emit an RFC1950 header byte pair.
  27242. </summary>
  27243. <param name="level">The compression level for the codec.</param>
  27244. <param name="wantRfc1950Header">whether to emit an initial RFC1950 byte pair in the compressed stream.</param>
  27245. <param name="bits">the number of window bits to use. If you don't know what this means, don't use this method.</param>
  27246. <returns>Z_OK if all goes well.</returns>
  27247. </member>
  27248. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.Deflate(Best.HTTP.Shared.Compression.Zlib.FlushType)">
  27249. <summary>
  27250. Deflate one batch of data.
  27251. </summary>
  27252. <remarks>
  27253. You must have set InputBuffer and OutputBuffer before calling this method.
  27254. </remarks>
  27255. <example>
  27256. <code>
  27257. private void DeflateBuffer(CompressionLevel level)
  27258. {
  27259. int bufferSize = 1024;
  27260. byte[] buffer = new byte[bufferSize];
  27261. ZlibCodec compressor = new ZlibCodec();
  27262. Console.WriteLine("\n============================================");
  27263. Console.WriteLine("Size of Buffer to Deflate: {0} bytes.", UncompressedBytes.Length);
  27264. MemoryStream ms = new MemoryStream();
  27265. int rc = compressor.InitializeDeflate(level);
  27266. compressor.InputBuffer = UncompressedBytes;
  27267. compressor.NextIn = 0;
  27268. compressor.AvailableBytesIn = UncompressedBytes.Length;
  27269. compressor.OutputBuffer = buffer;
  27270. // pass 1: deflate
  27271. do
  27272. {
  27273. compressor.NextOut = 0;
  27274. compressor.AvailableBytesOut = buffer.Length;
  27275. rc = compressor.Deflate(FlushType.None);
  27276. if (rc != ZlibConstants.Z_OK &amp;&amp; rc != ZlibConstants.Z_STREAM_END)
  27277. throw new Exception("deflating: " + compressor.Message);
  27278. ms.Write(compressor.OutputBuffer, 0, buffer.Length - compressor.AvailableBytesOut);
  27279. }
  27280. while (compressor.AvailableBytesIn &gt; 0 || compressor.AvailableBytesOut == 0);
  27281. // pass 2: finish and flush
  27282. do
  27283. {
  27284. compressor.NextOut = 0;
  27285. compressor.AvailableBytesOut = buffer.Length;
  27286. rc = compressor.Deflate(FlushType.Finish);
  27287. if (rc != ZlibConstants.Z_STREAM_END &amp;&amp; rc != ZlibConstants.Z_OK)
  27288. throw new Exception("deflating: " + compressor.Message);
  27289. if (buffer.Length - compressor.AvailableBytesOut &gt; 0)
  27290. ms.Write(buffer, 0, buffer.Length - compressor.AvailableBytesOut);
  27291. }
  27292. while (compressor.AvailableBytesIn &gt; 0 || compressor.AvailableBytesOut == 0);
  27293. compressor.EndDeflate();
  27294. ms.Seek(0, SeekOrigin.Begin);
  27295. CompressedBytes = new byte[compressor.TotalBytesOut];
  27296. ms.Read(CompressedBytes, 0, CompressedBytes.Length);
  27297. }
  27298. </code>
  27299. </example>
  27300. <param name="flush">whether to flush all data as you deflate. Generally you will want to
  27301. use Z_NO_FLUSH here, in a series of calls to Deflate(), and then call EndDeflate() to
  27302. flush everything.
  27303. </param>
  27304. <returns>Z_OK if all goes well.</returns>
  27305. </member>
  27306. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.EndDeflate">
  27307. <summary>
  27308. End a deflation session.
  27309. </summary>
  27310. <remarks>
  27311. Call this after making a series of one or more calls to Deflate(). All buffers are flushed.
  27312. </remarks>
  27313. <returns>Z_OK if all goes well.</returns>
  27314. </member>
  27315. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.ResetDeflate">
  27316. <summary>
  27317. Reset a codec for another deflation session.
  27318. </summary>
  27319. <remarks>
  27320. Call this to reset the deflation state. For example if a thread is deflating
  27321. non-consecutive blocks, you can call Reset() after the Deflate(Sync) of the first
  27322. block and before the next Deflate(None) of the second block.
  27323. </remarks>
  27324. <returns>Z_OK if all goes well.</returns>
  27325. </member>
  27326. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.SetDeflateParams(Best.HTTP.Shared.Compression.Zlib.CompressionLevel,Best.HTTP.Shared.Compression.Zlib.CompressionStrategy)">
  27327. <summary>
  27328. Set the CompressionStrategy and CompressionLevel for a deflation session.
  27329. </summary>
  27330. <param name="level">the level of compression to use.</param>
  27331. <param name="strategy">the strategy to use for compression.</param>
  27332. <returns>Z_OK if all goes well.</returns>
  27333. </member>
  27334. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZlibCodec.SetDictionary(System.Byte[])">
  27335. <summary>
  27336. Set the dictionary to be used for either Inflation or Deflation.
  27337. </summary>
  27338. <param name="dictionary">The dictionary bytes to use.</param>
  27339. <returns>Z_OK if all goes well.</returns>
  27340. </member>
  27341. <member name="T:Best.HTTP.Shared.Compression.Zlib.ZlibConstants">
  27342. <summary>
  27343. A bunch of constants used in the Zlib interface.
  27344. </summary>
  27345. </member>
  27346. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibConstants.WindowBitsMax">
  27347. <summary>
  27348. The maximum number of window bits for the Deflate algorithm.
  27349. </summary>
  27350. </member>
  27351. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibConstants.WindowBitsDefault">
  27352. <summary>
  27353. The default number of window bits for the Deflate algorithm.
  27354. </summary>
  27355. </member>
  27356. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibConstants.Z_OK">
  27357. <summary>
  27358. indicates everything is A-OK
  27359. </summary>
  27360. </member>
  27361. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibConstants.Z_STREAM_END">
  27362. <summary>
  27363. Indicates that the last operation reached the end of the stream.
  27364. </summary>
  27365. </member>
  27366. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibConstants.Z_NEED_DICT">
  27367. <summary>
  27368. The operation ended in need of a dictionary.
  27369. </summary>
  27370. </member>
  27371. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibConstants.Z_STREAM_ERROR">
  27372. <summary>
  27373. There was an error with the stream - not enough data, not open and readable, etc.
  27374. </summary>
  27375. </member>
  27376. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibConstants.Z_DATA_ERROR">
  27377. <summary>
  27378. There was an error with the data - not enough data, bad data, etc.
  27379. </summary>
  27380. </member>
  27381. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibConstants.Z_BUF_ERROR">
  27382. <summary>
  27383. There was an error with the working buffer.
  27384. </summary>
  27385. </member>
  27386. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibConstants.WorkingBufferSizeDefault">
  27387. <summary>
  27388. The size of the working buffer used in the ZlibCodec class. Defaults to 8192 bytes.
  27389. </summary>
  27390. </member>
  27391. <member name="F:Best.HTTP.Shared.Compression.Zlib.ZlibConstants.WorkingBufferSizeMin">
  27392. <summary>
  27393. The minimum size of the working buffer used in the ZlibCodec class. Currently it is 128 bytes.
  27394. </summary>
  27395. </member>
  27396. <member name="M:Best.HTTP.Shared.Compression.Zlib.ZTree.DistanceCode(System.Int32)">
  27397. <summary>
  27398. Map from a distance to a distance code.
  27399. </summary>
  27400. <remarks>
  27401. No side effects. _dist_code[256] and _dist_code[257] are never used.
  27402. </remarks>
  27403. </member>
  27404. <member name="M:Best.HTTP.Shared.Databases.Database`4.FromFirstMetadataIndex(System.Collections.Generic.IEnumerable{System.Int32})">
  27405. <summary>
  27406. Loads the first content from the metadata indexes.
  27407. </summary>
  27408. </member>
  27409. <member name="M:Best.HTTP.Shared.Databases.Database`4.FromMetadataIndex(System.Int32)">
  27410. <summary>
  27411. Loads the content from the metadata index.
  27412. </summary>
  27413. </member>
  27414. <member name="M:Best.HTTP.Shared.Databases.Database`4.FromMetadatas(System.Collections.Generic.IEnumerable{`1})">
  27415. <summary>
  27416. Loads all content from the metadatas.
  27417. </summary>
  27418. </member>
  27419. <member name="M:Best.HTTP.Shared.Databases.Database`4.FromMetadataIndexes(System.Collections.Generic.IEnumerable{System.Int32})">
  27420. <summary>
  27421. Loads all content from the metadata indexes.
  27422. </summary>
  27423. </member>
  27424. <member name="P:Best.HTTP.Shared.Databases.DiskManager`1.CacheSize">
  27425. <summary>
  27426. Sum size of the cached contents
  27427. </summary>
  27428. </member>
  27429. <member name="T:Best.HTTP.Shared.Databases.Indexing.NoAllocList`1">
  27430. <summary>
  27431. Implements most common list functions. With best case (no or only one item) it doesn't do any allocation.
  27432. </summary>
  27433. </member>
  27434. <member name="F:Best.HTTP.Shared.Databases.Indexing.Node`2.Depth">
  27435. <summary>
  27436. Depth of the node.
  27437. </summary>
  27438. </member>
  27439. <member name="P:Best.HTTP.Shared.Databases.Indexing.Node`2.BalanceFactor">
  27440. <summary>
  27441. Difference between LeftDepth and RightDepth.
  27442. </summary>
  27443. </member>
  27444. <member name="P:Best.HTTP.Shared.Databases.Indexing.Node`2.LeftDepth">
  27445. <summary>
  27446. Left node's Depth, or -1 if it's null.
  27447. </summary>
  27448. </member>
  27449. <member name="P:Best.HTTP.Shared.Databases.Indexing.Node`2.RightDepth">
  27450. <summary>
  27451. Right node's Depth, or -1 if it's null.
  27452. </summary>
  27453. </member>
  27454. <member name="M:Best.HTTP.Shared.Databases.Indexing.AVLTree`2.RemoveNode(Best.HTTP.Shared.Databases.Indexing.Node{`0,`1})">
  27455. <summary>
  27456. Removes node and reparent any child it has.
  27457. </summary>
  27458. </member>
  27459. <member name="M:Best.HTTP.Shared.Databases.IndexingService`2.Index(`1)">
  27460. <summary>
  27461. Index newly added metadata
  27462. </summary>
  27463. </member>
  27464. <member name="M:Best.HTTP.Shared.Databases.IndexingService`2.Remove(`1)">
  27465. <summary>
  27466. Remove metadata from all indexes.
  27467. </summary>
  27468. </member>
  27469. <member name="M:Best.HTTP.Shared.Databases.IndexingService`2.Clear">
  27470. <summary>
  27471. Clear all indexes
  27472. </summary>
  27473. </member>
  27474. <member name="M:Best.HTTP.Shared.Databases.IndexingService`2.GetOptimizedIndexes">
  27475. <summary>
  27476. Get indexes in an optimized order. This is usually one of the indexes' WalkHorizontal() call.
  27477. </summary>
  27478. </member>
  27479. <member name="M:Best.HTTP.Shared.Databases.MetadataService`2.CreateFrom(System.IO.Stream)">
  27480. <summary>
  27481. Called when metadata loaded from file
  27482. </summary>
  27483. </member>
  27484. <member name="M:Best.HTTP.Shared.Databases.MetadataService`2.CreateDefault(`1,System.Int32,System.Int32,System.Action{`1,`0})">
  27485. <summary>
  27486. Called by a concrete MetadataService implementation to create a new metadata
  27487. </summary>
  27488. </member>
  27489. <member name="M:Best.HTTP.Shared.Extensions.Extensions.AsciiToString(System.Byte[])">
  27490. <summary>
  27491. On WP8 platform there are no ASCII encoding.
  27492. </summary>
  27493. </member>
  27494. <member name="M:Best.HTTP.Shared.Extensions.Extensions.GetASCIIBytes(System.String)">
  27495. <summary>
  27496. On WP8 platform there are no ASCII encoding.
  27497. </summary>
  27498. </member>
  27499. <member name="M:Best.HTTP.Shared.Extensions.Extensions.IsHostIsAnIPAddress(System.Uri)">
  27500. <summary>
  27501. Returns true if the Uri's host is a valid IPv4 or IPv6 address.
  27502. </summary>
  27503. </member>
  27504. <member name="M:Best.HTTP.Shared.Extensions.Extensions.IsIpV4AddressValid(System.String)">
  27505. <summary>
  27506. Validates an IPv4 address.
  27507. </summary>
  27508. </member>
  27509. <member name="M:Best.HTTP.Shared.Extensions.Extensions.IsIpV6AddressValid(System.String)">
  27510. <summary>
  27511. Validates an IPv6 address.
  27512. </summary>
  27513. </member>
  27514. <member name="M:Best.HTTP.Shared.Extensions.Extensions.ReadBuffer(System.IO.Stream,System.Byte[])">
  27515. <summary>
  27516. Will fill the entire buffer from the stream. Will throw an exception when the underlying stream is closed.
  27517. </summary>
  27518. </member>
  27519. <member name="T:Best.HTTP.Shared.Extensions.HeaderParser">
  27520. <summary>
  27521. Will parse a comma-separeted header value
  27522. </summary>
  27523. </member>
  27524. <member name="T:Best.HTTP.Shared.Extensions.HeaderValue">
  27525. <summary>
  27526. Used in string parsers. Its Value is optional.
  27527. </summary>
  27528. </member>
  27529. <member name="T:Best.HTTP.Shared.Extensions.HeartbeatManager">
  27530. <summary>
  27531. A manager class that can handle subscribing and unsubscribeing in the same update.
  27532. </summary>
  27533. </member>
  27534. <member name="T:Best.HTTP.Shared.Extensions.KeyValuePairList">
  27535. <summary>
  27536. Base class for specialized parsers
  27537. </summary>
  27538. </member>
  27539. <member name="M:Best.HTTP.Shared.Extensions.TimerData.CreateNew">
  27540. <summary>
  27541. Create a new TimerData but the Created field will be set to the current time.
  27542. </summary>
  27543. </member>
  27544. <member name="T:Best.HTTP.Shared.HTTPManager">
  27545. <summary>
  27546. Global entry point to access and manage main services of the plugin.
  27547. </summary>
  27548. </member>
  27549. <member name="M:Best.HTTP.Shared.HTTPManager.#cctor">
  27550. <summary>
  27551. Static constructor. Setup default values.
  27552. </summary>
  27553. </member>
  27554. <member name="F:Best.HTTP.Shared.HTTPManager.OnSetupFinished">
  27555. <summary>
  27556. Delegate for the setup finished event.
  27557. </summary>
  27558. </member>
  27559. <member name="P:Best.HTTP.Shared.HTTPManager.PerHostSettings">
  27560. <summary>
  27561. Instance of the per-host settings manager.
  27562. </summary>
  27563. </member>
  27564. <member name="P:Best.HTTP.Shared.HTTPManager.CurrentFrameDateTime">
  27565. <summary>
  27566. Cached DateTime value for cases where high resolution isn't needed.
  27567. </summary>
  27568. <remarks>Warning!! It must be used only on the main update thread!</remarks>
  27569. </member>
  27570. <member name="P:Best.HTTP.Shared.HTTPManager.RootSaveFolderProvider">
  27571. <summary>
  27572. By default the plugin will save all cache and cookie data under the path returned by Application.persistentDataPath.
  27573. You can assign a function to this delegate to return a custom root path to define a new path.
  27574. <remarks>This delegate will be called on a non Unity thread!</remarks>
  27575. </summary>
  27576. </member>
  27577. <member name="P:Best.HTTP.Shared.HTTPManager.Proxy">
  27578. <summary>
  27579. The global, default proxy for all HTTPRequests. The HTTPRequest's Proxy still can be changed per-request. Default value is null.
  27580. </summary>
  27581. </member>
  27582. <member name="P:Best.HTTP.Shared.HTTPManager.Heartbeats">
  27583. <summary>
  27584. Heartbeat manager to use less threads in the plugin. The heartbeat updates are called from the OnUpdate function.
  27585. </summary>
  27586. </member>
  27587. <member name="P:Best.HTTP.Shared.HTTPManager.Logger">
  27588. <summary>
  27589. A basic Best.HTTP.Logger.ILogger implementation to be able to log intelligently additional informations about the plugin's internal mechanism.
  27590. </summary>
  27591. </member>
  27592. <member name="F:Best.HTTP.Shared.HTTPManager.IOService">
  27593. <summary>
  27594. An IIOService implementation to handle filesystem operations.
  27595. </summary>
  27596. </member>
  27597. <member name="F:Best.HTTP.Shared.HTTPManager.UserAgent">
  27598. <summary>
  27599. User-agent string that will be sent with each requests.
  27600. </summary>
  27601. </member>
  27602. <member name="P:Best.HTTP.Shared.HTTPManager.IsQuitting">
  27603. <summary>
  27604. It's true if the application is quitting and the plugin is shutting down itself.
  27605. </summary>
  27606. </member>
  27607. <member name="P:Best.HTTP.Shared.HTTPManager.LocalCache">
  27608. <summary>
  27609. The local content cache, maintained by the plugin. When set to a non-null value, Maintain called immediately on the cache.
  27610. </summary>
  27611. </member>
  27612. <member name="M:Best.HTTP.Shared.HTTPManager.Setup">
  27613. <summary>
  27614. Initializes the HTTPManager with default settings. This method should be called on Unity's main thread before using the HTTP plugin. By default it gets called by <see cref="T:Best.HTTP.Shared.HTTPUpdateDelegator"/>.
  27615. </summary>
  27616. </member>
  27617. <member name="M:Best.HTTP.Shared.HTTPManager.GetRootSaveFolder">
  27618. <summary>
  27619. Will return where the various caches should be saved.
  27620. </summary>
  27621. </member>
  27622. <member name="M:Best.HTTP.Shared.HTTPManager.OnUpdate">
  27623. <summary>
  27624. Updates the HTTPManager. This method should be called regularly from a Unity event (e.g., Update, LateUpdate).
  27625. It processes various events and callbacks and manages internal tasks.
  27626. </summary>
  27627. </member>
  27628. <member name="M:Best.HTTP.Shared.HTTPManager.OnQuit">
  27629. <summary>
  27630. Shuts down the HTTPManager and performs cleanup operations. This method should be called when the application is quitting.
  27631. </summary>
  27632. </member>
  27633. <member name="M:Best.HTTP.Shared.HTTPManager.AbortAll">
  27634. <summary>
  27635. Aborts all ongoing HTTP requests and performs an immediate shutdown of the HTTPManager.
  27636. </summary>
  27637. </member>
  27638. <member name="T:Best.HTTP.Shared.ThreadingMode">
  27639. <summary>
  27640. Threading mode the plugin will use to call HTTPManager.OnUpdate().
  27641. </summary>
  27642. </member>
  27643. <member name="F:Best.HTTP.Shared.ThreadingMode.UnityUpdate">
  27644. <summary>
  27645. HTTPManager.OnUpdate() is called from the HTTPUpdateDelegator's Update functions (Unity's main thread).
  27646. </summary>
  27647. </member>
  27648. <member name="F:Best.HTTP.Shared.ThreadingMode.Threaded">
  27649. <summary>
  27650. The plugin starts a dedicated thread to call HTTPManager.OnUpdate() periodically.
  27651. </summary>
  27652. </member>
  27653. <member name="F:Best.HTTP.Shared.ThreadingMode.None">
  27654. <summary>
  27655. HTTPManager.OnUpdate() will not be called automatically.
  27656. </summary>
  27657. </member>
  27658. <member name="T:Best.HTTP.Shared.HTTPUpdateDelegator">
  27659. <summary>
  27660. Will route some U3D calls to the HTTPManager.
  27661. </summary>
  27662. </member>
  27663. <member name="P:Best.HTTP.Shared.HTTPUpdateDelegator.Instance">
  27664. <summary>
  27665. The singleton instance of the HTTPUpdateDelegator
  27666. </summary>
  27667. </member>
  27668. <member name="P:Best.HTTP.Shared.HTTPUpdateDelegator.IsCreated">
  27669. <summary>
  27670. True, if the Instance property should hold a valid value.
  27671. </summary>
  27672. </member>
  27673. <member name="P:Best.HTTP.Shared.HTTPUpdateDelegator.IsThreadRunning">
  27674. <summary>
  27675. It's true if the dispatch thread running.
  27676. </summary>
  27677. </member>
  27678. <member name="P:Best.HTTP.Shared.HTTPUpdateDelegator.CurrentThreadingMode">
  27679. <summary>
  27680. The current threading mode the plugin is in.
  27681. </summary>
  27682. </member>
  27683. <member name="P:Best.HTTP.Shared.HTTPUpdateDelegator.ThreadFrequencyInMS">
  27684. <summary>
  27685. How much time the plugin should wait between two update call. Its default value 100 ms.
  27686. </summary>
  27687. </member>
  27688. <member name="F:Best.HTTP.Shared.HTTPUpdateDelegator.OnBeforeApplicationQuit">
  27689. <summary>
  27690. Called in the OnApplicationQuit function. If this function returns False, the plugin will not start to
  27691. shut down itself.
  27692. </summary>
  27693. </member>
  27694. <member name="F:Best.HTTP.Shared.HTTPUpdateDelegator.OnApplicationForegroundStateChanged">
  27695. <summary>
  27696. Called when the Unity application's foreground state changed.
  27697. </summary>
  27698. </member>
  27699. <member name="M:Best.HTTP.Shared.HTTPUpdateDelegator.ResetSetup">
  27700. <summary>
  27701. Called after scene loaded to support Configurable Enter Play Mode (https://docs.unity3d.com/2019.3/Documentation/Manual/ConfigurableEnterPlayMode.html)
  27702. </summary>
  27703. </member>
  27704. <member name="M:Best.HTTP.Shared.HTTPUpdateDelegator.CheckInstance">
  27705. <summary>
  27706. Will create the HTTPUpdateDelegator instance and set it up.
  27707. </summary>
  27708. </member>
  27709. <member name="M:Best.HTTP.Shared.HTTPUpdateDelegator.IsMainThread">
  27710. <summary>
  27711. Return true if the call happens on the Unity main thread. Setup must be called before to save the thread id!
  27712. </summary>
  27713. </member>
  27714. <member name="M:Best.HTTP.Shared.HTTPUpdateDelegator.SetThreadingMode(Best.HTTP.Shared.ThreadingMode)">
  27715. <summary>
  27716. Set directly the threading mode to use.
  27717. </summary>
  27718. </member>
  27719. <member name="M:Best.HTTP.Shared.HTTPUpdateDelegator.SwapThreadingMode">
  27720. <summary>
  27721. Swaps threading mode between Unity's Update function or a distinct thread.
  27722. </summary>
  27723. </member>
  27724. <member name="M:Best.HTTP.Shared.HTTPUpdateDelegator.PingUpdateThread">
  27725. <summary>
  27726. Pings the update thread to call HTTPManager.OnUpdate immediately.
  27727. </summary>
  27728. <remarks>Works only when the current threading mode is Threaded!</remarks>
  27729. </member>
  27730. <member name="T:Best.HTTP.Shared.Logger.FileOutput">
  27731. <summary>
  27732. Provides an implementation of <see cref="T:Best.HTTP.Shared.Logger.ILogOutput"/> that writes log messages to a file.
  27733. </summary>
  27734. </member>
  27735. <member name="P:Best.HTTP.Shared.Logger.FileOutput.AcceptColor">
  27736. <summary>
  27737. Gets a value indicating whether this log output accepts color codes. Always returns <c>false</c>.
  27738. </summary>
  27739. </member>
  27740. <member name="M:Best.HTTP.Shared.Logger.FileOutput.#ctor(System.String)">
  27741. <summary>
  27742. Initializes a new instance of the FileOutput class with the specified file name.
  27743. </summary>
  27744. <param name="fileName">The name of the file to write log messages to.</param>
  27745. </member>
  27746. <member name="M:Best.HTTP.Shared.Logger.FileOutput.Write(Best.HTTP.Shared.Logger.Loglevels,System.String)">
  27747. <summary>
  27748. Writes a log message to the file.
  27749. </summary>
  27750. <param name="level">The log level of the message.</param>
  27751. <param name="logEntry">The log message to write.</param>
  27752. </member>
  27753. <member name="M:Best.HTTP.Shared.Logger.FileOutput.Flush">
  27754. <summary>
  27755. Flushes any buffered log messages to the file.
  27756. </summary>
  27757. </member>
  27758. <member name="M:Best.HTTP.Shared.Logger.FileOutput.Dispose">
  27759. <summary>
  27760. Releases any resources used by the FileOutput instance.
  27761. </summary>
  27762. </member>
  27763. <member name="T:Best.HTTP.Shared.Logger.Loglevels">
  27764. <summary>
  27765. Available logging levels.
  27766. </summary>
  27767. </member>
  27768. <member name="F:Best.HTTP.Shared.Logger.Loglevels.All">
  27769. <summary>
  27770. All message will be logged.
  27771. </summary>
  27772. </member>
  27773. <member name="F:Best.HTTP.Shared.Logger.Loglevels.Information">
  27774. <summary>
  27775. Only Informations and above will be logged.
  27776. </summary>
  27777. </member>
  27778. <member name="F:Best.HTTP.Shared.Logger.Loglevels.Warning">
  27779. <summary>
  27780. Only Warnings and above will be logged.
  27781. </summary>
  27782. </member>
  27783. <member name="F:Best.HTTP.Shared.Logger.Loglevels.Error">
  27784. <summary>
  27785. Only Errors and above will be logged.
  27786. </summary>
  27787. </member>
  27788. <member name="F:Best.HTTP.Shared.Logger.Loglevels.Exception">
  27789. <summary>
  27790. Only Exceptions will be logged.
  27791. </summary>
  27792. </member>
  27793. <member name="F:Best.HTTP.Shared.Logger.Loglevels.None">
  27794. <summary>
  27795. No logging will occur.
  27796. </summary>
  27797. </member>
  27798. <member name="T:Best.HTTP.Shared.Logger.ILogOutput">
  27799. <summary>
  27800. Represents an output target for log messages.
  27801. </summary>
  27802. <remarks>
  27803. <para>
  27804. This interface defines methods for writing log messages to an output target.
  27805. Implementations of this interface are used to configure where log messages
  27806. should be written.
  27807. </para>
  27808. <para>
  27809. Two of its out-of-the-box implementations are
  27810. <list type="bullet">
  27811. <item><description><see cref="T:Best.HTTP.Shared.Logger.UnityOutput">UnityOutput</see></description></item>
  27812. <item><description><see cref="T:Best.HTTP.Shared.Logger.FileOutput">FileOutput</see></description></item>
  27813. </list>
  27814. </para>
  27815. </remarks>
  27816. </member>
  27817. <member name="P:Best.HTTP.Shared.Logger.ILogOutput.AcceptColor">
  27818. <summary>
  27819. Gets a value indicating whether the log output supports colored text.
  27820. </summary>
  27821. </member>
  27822. <member name="M:Best.HTTP.Shared.Logger.ILogOutput.Write(Best.HTTP.Shared.Logger.Loglevels,System.String)">
  27823. <summary>
  27824. Writes a log entry to the output.
  27825. </summary>
  27826. <param name="level">The logging level of the entry.</param>
  27827. <param name="logEntry">The log message to write.</param>
  27828. </member>
  27829. <member name="M:Best.HTTP.Shared.Logger.ILogOutput.Flush">
  27830. <summary>
  27831. Flushes any buffered log entries to the output.
  27832. </summary>
  27833. </member>
  27834. <member name="T:Best.HTTP.Shared.Logger.IFilter">
  27835. <summary>
  27836. Represents a filter for further sort out what log entries to include in the final log output.
  27837. </summary>
  27838. </member>
  27839. <member name="M:Best.HTTP.Shared.Logger.IFilter.Include(System.String)">
  27840. <summary>
  27841. Return <c>true</c> if the division must be included in the output.
  27842. </summary>
  27843. </member>
  27844. <member name="T:Best.HTTP.Shared.Logger.ILogger">
  27845. <summary>
  27846. Represents a logger for recording log messages.
  27847. </summary>
  27848. </member>
  27849. <member name="P:Best.HTTP.Shared.Logger.ILogger.Level">
  27850. <summary>
  27851. Gets or sets the minimum severity level for logging.
  27852. </summary>
  27853. </member>
  27854. <member name="P:Best.HTTP.Shared.Logger.ILogger.Output">
  27855. <summary>
  27856. Gets or sets the output target for log messages.
  27857. </summary>
  27858. <value>
  27859. The <see cref="T:Best.HTTP.Shared.Logger.ILogOutput"/> instance used to write log messages.
  27860. </value>
  27861. </member>
  27862. <member name="P:Best.HTTP.Shared.Logger.ILogger.Filter">
  27863. <summary>
  27864. Gets or sets an output filter to decide what messages are included or not.
  27865. </summary>
  27866. <value>The <see cref="T:Best.HTTP.Shared.Logger.IFilter"/> instance used for filtering.</value>
  27867. </member>
  27868. <member name="P:Best.HTTP.Shared.Logger.ILogger.IsEmpty">
  27869. <summary>
  27870. Property indicating whether the logger's internal queue is empty or not.
  27871. </summary>
  27872. </member>
  27873. <member name="P:Best.HTTP.Shared.Logger.ILogger.IsDiagnostic">
  27874. <summary>
  27875. Gets a value indicating whether diagnostic logging is enabled.
  27876. </summary>
  27877. <remarks>
  27878. Diagnostic logging is enabled when <see cref="P:Best.HTTP.Shared.Logger.ILogger.Level"/> is set to <see cref="F:Best.HTTP.Shared.Logger.Loglevels.All"/>.
  27879. </remarks>
  27880. </member>
  27881. <member name="M:Best.HTTP.Shared.Logger.ILogger.Verbose(System.String,System.String,Best.HTTP.Shared.Logger.LoggingContext)">
  27882. <summary>
  27883. Logs a message with <see cref="F:Best.HTTP.Shared.Logger.Loglevels.All"/> level.
  27884. </summary>
  27885. <param name="division">The division or category of the log message.</param>
  27886. <param name="msg">The verbose log message.</param>
  27887. <param name="context">The optional <see cref="T:Best.HTTP.Shared.Logger.LoggingContext"/> for additional context.</param>
  27888. </member>
  27889. <member name="M:Best.HTTP.Shared.Logger.ILogger.Information(System.String,System.String,Best.HTTP.Shared.Logger.LoggingContext)">
  27890. <summary>
  27891. Logs a message with <see cref="F:Best.HTTP.Shared.Logger.Loglevels.Information"/> level.
  27892. </summary>
  27893. <param name="division">The division or category of the log message.</param>
  27894. <param name="msg">The verbose log message.</param>
  27895. <param name="context">The optional <see cref="T:Best.HTTP.Shared.Logger.LoggingContext"/> for additional context.</param>
  27896. </member>
  27897. <member name="M:Best.HTTP.Shared.Logger.ILogger.Warning(System.String,System.String,Best.HTTP.Shared.Logger.LoggingContext)">
  27898. <summary>
  27899. Logs a message with <see cref="F:Best.HTTP.Shared.Logger.Loglevels.Warning"/> level.
  27900. </summary>
  27901. <param name="division">The division or category of the log message.</param>
  27902. <param name="msg">The verbose log message.</param>
  27903. <param name="context">The optional <see cref="T:Best.HTTP.Shared.Logger.LoggingContext"/> for additional context.</param>
  27904. </member>
  27905. <member name="M:Best.HTTP.Shared.Logger.ILogger.Error(System.String,System.String,Best.HTTP.Shared.Logger.LoggingContext)">
  27906. <summary>
  27907. Logs a message with <see cref="F:Best.HTTP.Shared.Logger.Loglevels.Error"/> level.
  27908. </summary>
  27909. <param name="division">The division or category of the log message.</param>
  27910. <param name="msg">The verbose log message.</param>
  27911. <param name="context">The optional <see cref="T:Best.HTTP.Shared.Logger.LoggingContext"/> for additional context.</param>
  27912. </member>
  27913. <member name="M:Best.HTTP.Shared.Logger.ILogger.Exception(System.String,System.String,System.Exception,Best.HTTP.Shared.Logger.LoggingContext)">
  27914. <summary>
  27915. Logs a message with <see cref="F:Best.HTTP.Shared.Logger.Loglevels.Exception"/> level.
  27916. </summary>
  27917. <param name="division">The division or category of the log message.</param>
  27918. <param name="msg">The verbose log message.</param>
  27919. <param name="context">The optional <see cref="T:Best.HTTP.Shared.Logger.LoggingContext"/> for additional context.</param>
  27920. </member>
  27921. <member name="T:Best.HTTP.Shared.Logger.LoggingContext">
  27922. <summary>
  27923. Represents a logging context for categorizing and organizing log messages.
  27924. </summary>
  27925. <remarks>
  27926. The LoggingContext class is used to provide additional context information
  27927. to log messages, allowing for better categorization and organization of log output. It can be
  27928. associated with specific objects or situations to enrich log entries with context-specific data.
  27929. </remarks>
  27930. </member>
  27931. <member name="P:Best.HTTP.Shared.Logger.LoggingContext.Hash">
  27932. <summary>
  27933. Gets the unique hash value of this logging context.
  27934. </summary>
  27935. </member>
  27936. <member name="M:Best.HTTP.Shared.Logger.LoggingContext.#ctor(System.Object)">
  27937. <summary>
  27938. Initializes a new instance of the LoggingContext class associated with the specified object.
  27939. </summary>
  27940. <param name="boundto">The object to associate the context with.</param>
  27941. </member>
  27942. <member name="M:Best.HTTP.Shared.Logger.LoggingContext.Add(System.String,System.Int64)">
  27943. <summary>
  27944. Adds a <c>long</c> value to the logging context.
  27945. </summary>
  27946. <param name="key">The key to associate with the value.</param>
  27947. <param name="value">The <c>long</c> value to add.</param>
  27948. </member>
  27949. <member name="M:Best.HTTP.Shared.Logger.LoggingContext.Add(System.String,System.Boolean)">
  27950. <summary>
  27951. Adds a <c>bool</c> value to the logging context.
  27952. </summary>
  27953. <param name="key">The key to associate with the value.</param>
  27954. <param name="value">The <c>bool</c> value to add.</param>
  27955. </member>
  27956. <member name="M:Best.HTTP.Shared.Logger.LoggingContext.Add(System.String,System.String)">
  27957. <summary>
  27958. Adds a <c>string</c> value to the logging context.
  27959. </summary>
  27960. <param name="key">The key to associate with the value.</param>
  27961. <param name="value">The <c>string</c> value to add.</param>
  27962. </member>
  27963. <member name="M:Best.HTTP.Shared.Logger.LoggingContext.Add(System.String,Best.HTTP.Shared.Logger.LoggingContext)">
  27964. <summary>
  27965. Adds a <c>LoggingContext</c> value to the logging context.
  27966. </summary>
  27967. <param name="key">The key to associate with the value.</param>
  27968. <param name="value">The <c>LoggingContext</c> value to add.</param>
  27969. </member>
  27970. <member name="M:Best.HTTP.Shared.Logger.LoggingContext.GetStringField(System.String)">
  27971. <summary>
  27972. Gets the <c>string</c> field with the specified name from the logging context.
  27973. </summary>
  27974. <param name="fieldName">The name of the <c>string</c> field to retrieve.</param>
  27975. <returns>The value of the <c>string</c> field or <c>null</c> if not found.</returns>
  27976. </member>
  27977. <member name="M:Best.HTTP.Shared.Logger.LoggingContext.Remove(System.String)">
  27978. <summary>
  27979. Removes a field from the logging context by its key.
  27980. </summary>
  27981. <param name="key">The key of the field to remove.</param>
  27982. </member>
  27983. <member name="M:Best.HTTP.Shared.Logger.LoggingContext.ToJson(System.Text.StringBuilder)">
  27984. <summary>
  27985. Converts the logging context and its associated fields to a JSON string representation.
  27986. </summary>
  27987. <param name="sb">A <see cref="T:System.Text.StringBuilder"/> instance to which the JSON string is appended.</param>
  27988. <remarks>
  27989. This method serializes the logging context and its associated fields into a JSON format
  27990. for structured logging purposes. The resulting JSON string represents the context and its fields, making it
  27991. suitable for inclusion in log entries for better analysis and debugging.
  27992. </remarks>
  27993. </member>
  27994. <member name="T:Best.HTTP.Shared.Logger.SingleDivisionFilter">
  27995. <summary>
  27996. <see cref="T:Best.HTTP.Shared.Logger.IFilter"/> implementation to include only one division in the log output.
  27997. </summary>
  27998. </member>
  27999. <member name="T:Best.HTTP.Shared.Logger.MultiDivisionFilter">
  28000. <summary>
  28001. <see cref="T:Best.HTTP.Shared.Logger.IFilter"/> implementation to allow filtering for multiple divisions.
  28002. </summary>
  28003. </member>
  28004. <member name="T:Best.HTTP.Shared.Logger.UnityOutput">
  28005. <summary>
  28006. Provides an implementation of <see cref="T:Best.HTTP.Shared.Logger.ILogOutput"/> that writes log messages to the Unity Debug Console.
  28007. </summary>
  28008. </member>
  28009. <member name="P:Best.HTTP.Shared.Logger.UnityOutput.AcceptColor">
  28010. <summary>
  28011. Gets a value indicating whether this log output accepts color codes.
  28012. </summary>
  28013. <remarks>
  28014. This property returns <c>true</c> when running in the Unity Editor and <c>false</c> otherwise.
  28015. </remarks>
  28016. </member>
  28017. <member name="M:Best.HTTP.Shared.Logger.UnityOutput.Write(Best.HTTP.Shared.Logger.Loglevels,System.String)">
  28018. <summary>
  28019. Writes a log message to the Unity Debug Console based on the specified log level.
  28020. </summary>
  28021. <param name="level">The log level of the message.</param>
  28022. <param name="logEntry">The log message to write.</param>
  28023. </member>
  28024. <member name="M:Best.HTTP.Shared.Logger.UnityOutput.Best#HTTP#Shared#Logger#ILogOutput#Flush">
  28025. <summary>
  28026. This implementation does nothing.
  28027. </summary>
  28028. </member>
  28029. <member name="T:Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes">
  28030. <summary>
  28031. These are the different modes that the plugin want's to use a filestream.
  28032. </summary>
  28033. </member>
  28034. <member name="F:Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes.Create">
  28035. <summary>
  28036. Create a new file.
  28037. </summary>
  28038. </member>
  28039. <member name="F:Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes.OpenRead">
  28040. <summary>
  28041. Open an existing file for reading.
  28042. </summary>
  28043. </member>
  28044. <member name="F:Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes.OpenReadWrite">
  28045. <summary>
  28046. Open or create a file for read and write.
  28047. </summary>
  28048. </member>
  28049. <member name="F:Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes.Append">
  28050. <summary>
  28051. Open an existing file for writing to the end.
  28052. </summary>
  28053. </member>
  28054. <member name="T:Best.HTTP.Shared.PlatformSupport.FileSystem.IIOService">
  28055. <summary>
  28056. Interface for file-system abstraction.
  28057. </summary>
  28058. </member>
  28059. <member name="M:Best.HTTP.Shared.PlatformSupport.FileSystem.IIOService.DirectoryCreate(System.String)">
  28060. <summary>
  28061. Create a directory for the given path.
  28062. </summary>
  28063. </member>
  28064. <member name="M:Best.HTTP.Shared.PlatformSupport.FileSystem.IIOService.DirectoryExists(System.String)">
  28065. <summary>
  28066. Return true if the directory exists for the given path.
  28067. </summary>
  28068. </member>
  28069. <member name="M:Best.HTTP.Shared.PlatformSupport.FileSystem.IIOService.DirectoryDelete(System.String)">
  28070. <summary>
  28071. Delete the directory.
  28072. </summary>
  28073. </member>
  28074. <member name="M:Best.HTTP.Shared.PlatformSupport.FileSystem.IIOService.GetFiles(System.String)">
  28075. <summary>
  28076. Return with the file names for the given path.
  28077. </summary>
  28078. <param name="path"></param>
  28079. <returns></returns>
  28080. </member>
  28081. <member name="M:Best.HTTP.Shared.PlatformSupport.FileSystem.IIOService.FileDelete(System.String)">
  28082. <summary>
  28083. Delete the file for the given path.
  28084. </summary>
  28085. </member>
  28086. <member name="M:Best.HTTP.Shared.PlatformSupport.FileSystem.IIOService.FileExists(System.String)">
  28087. <summary>
  28088. Return true if the file exists on the given path.
  28089. </summary>
  28090. </member>
  28091. <member name="M:Best.HTTP.Shared.PlatformSupport.FileSystem.IIOService.CreateFileStream(System.String,Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes)">
  28092. <summary>
  28093. Create a stream that can read and/or write a file on the given path.
  28094. </summary>
  28095. </member>
  28096. <member name="T:Best.HTTP.Shared.PlatformSupport.IL2CPP.Option">
  28097. <summary>
  28098. The code generation options available for IL to C++ conversion.
  28099. Enable or disabled these with caution.
  28100. </summary>
  28101. </member>
  28102. <member name="F:Best.HTTP.Shared.PlatformSupport.IL2CPP.Option.NullChecks">
  28103. <summary>
  28104. Enable or disable code generation for null checks.
  28105. Global null check support is enabled by default when il2cpp.exe
  28106. is launched from the Unity editor.
  28107. Disabling this will prevent NullReferenceException exceptions from
  28108. being thrown in generated code. In *most* cases, code that dereferences
  28109. a null pointer will crash then. Sometimes the point where the crash
  28110. happens is later than the location where the null reference check would
  28111. have been emitted though.
  28112. </summary>
  28113. </member>
  28114. <member name="F:Best.HTTP.Shared.PlatformSupport.IL2CPP.Option.ArrayBoundsChecks">
  28115. <summary>
  28116. Enable or disable code generation for array bounds checks.
  28117. Global array bounds check support is enabled by default when il2cpp.exe
  28118. is launched from the Unity editor.
  28119. Disabling this will prevent IndexOutOfRangeException exceptions from
  28120. being thrown in generated code. This will allow reading and writing to
  28121. memory outside of the bounds of an array without any runtime checks.
  28122. Disable this check with extreme caution.
  28123. </summary>
  28124. </member>
  28125. <member name="F:Best.HTTP.Shared.PlatformSupport.IL2CPP.Option.DivideByZeroChecks">
  28126. <summary>
  28127. Enable or disable code generation for divide by zero checks.
  28128. Global divide by zero check support is disabled by default when il2cpp.exe
  28129. is launched from the Unity editor.
  28130. Enabling this will cause DivideByZeroException exceptions to be
  28131. thrown in generated code. Most code doesn't need to handle this
  28132. exception, so it is probably safe to leave it disabled.
  28133. </summary>
  28134. </member>
  28135. <member name="T:Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppSetOptionAttribute">
  28136. <summary>
  28137. Use this attribute on a class, method, or property to inform the IL2CPP code conversion utility to override the
  28138. global setting for one of a few different runtime checks.
  28139. Example:
  28140. [Il2CppSetOption(Option.NullChecks, false)]
  28141. public static string MethodWithNullChecksDisabled()
  28142. {
  28143. var tmp = new Object();
  28144. return tmp.ToString();
  28145. }
  28146. </summary>
  28147. </member>
  28148. <member name="T:Best.HTTP.Shared.PlatformSupport.IL2CPP.PreserveAttribute">
  28149. <summary>
  28150. https://docs.unity3d.com/Manual/ManagedCodeStripping.html
  28151. </summary>
  28152. </member>
  28153. <member name="T:Best.HTTP.Shared.PlatformSupport.Memory.UserModeLock">
  28154. <summary>
  28155. Light-weight user-mode lock for code blocks that has rare contentions and doesn't take a long time to finish.
  28156. </summary>
  28157. </member>
  28158. <member name="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool">
  28159. <summary>
  28160. The BufferPool is a foundational element of the Best HTTP package, aiming to reduce dynamic memory allocation overheads by reusing byte arrays. The concept is elegantly simple: rather than allocating and deallocating memory for every requirement, byte arrays can be "borrowed" and "returned" within this pool. Once returned, these arrays are retained for subsequent use, minimizing repetitive memory operations.
  28161. <para>While the BufferPool is housed within the Best HTTP package, its benefits are not limited to just HTTP operations. All protocols and packages integrated with or built upon the Best HTTP package utilize and benefit from the BufferPool. This ensures that memory is used efficiently and performance remains optimal across all integrated components.</para>
  28162. </summary>
  28163. </member>
  28164. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.NoData">
  28165. <summary>
  28166. Represents an empty byte array that can be returned for zero-length requests.
  28167. </summary>
  28168. </member>
  28169. <member name="P:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.IsEnabled">
  28170. <summary>
  28171. Gets or sets a value indicating whether the buffer pooling mechanism is enabled or disabled.
  28172. Disabling will also clear all stored entries.
  28173. </summary>
  28174. </member>
  28175. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.RemoveOlderThan">
  28176. <summary>
  28177. Specifies the duration after which buffer entries, once released back to the pool, are deemed old and will be
  28178. considered for removal in the next maintenance cycle.
  28179. </summary>
  28180. </member>
  28181. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.RunMaintenanceEvery">
  28182. <summary>
  28183. Specifies how frequently the maintenance cycle should run to manage old buffers.
  28184. </summary>
  28185. </member>
  28186. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.MinBufferSize">
  28187. <summary>
  28188. Specifies the minimum buffer size that will be allocated. If a request is made for a size smaller than this and canBeLarger is <c>true</c>,
  28189. this size will be used.
  28190. </summary>
  28191. </member>
  28192. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.MaxBufferSize">
  28193. <summary>
  28194. Specifies the maximum size of a buffer that the system will consider storing back into the pool.
  28195. </summary>
  28196. </member>
  28197. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.MaxPoolSize">
  28198. <summary>
  28199. Specifies the maximum total size of all stored buffers. When the buffer reach this threshold, new releases will be declined.
  28200. </summary>
  28201. </member>
  28202. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.RemoveEmptyLists">
  28203. <summary>
  28204. Indicates whether to remove buffer stores that don't hold any buffers from the free list.
  28205. </summary>
  28206. </member>
  28207. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.IsDoubleReleaseCheckEnabled">
  28208. <summary>
  28209. If set to <c>true</c>, and a byte array is released back to the pool more than once, an error will be logged.
  28210. </summary>
  28211. <remarks>Error checking is expensive and has a very large overhead! Turn it on with caution!</remarks>
  28212. </member>
  28213. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.Get(System.Int64,System.Boolean,Best.HTTP.Shared.Logger.LoggingContext)">
  28214. <summary>
  28215. Fetches a byte array from the pool.
  28216. </summary>
  28217. <remarks>Depending on the `canBeLarger` parameter, the returned buffer may be larger than the requested size!</remarks>
  28218. <param name="size">Requested size of the buffer.</param>
  28219. <param name="canBeLarger">If <c>true</c>, the returned buffer can be larger than the requested size.</param>
  28220. <param name="context">Optional context for logging purposes.</param>
  28221. <returns>A byte array from the pool or a newly allocated one if suitable size is not available.</returns>
  28222. </member>
  28223. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.ReleaseBulk(System.Collections.Concurrent.ConcurrentQueue{Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment})">
  28224. <summary>
  28225. Releases a list of buffer segments back to the pool in a bulk operation.
  28226. </summary>
  28227. <param name="segments">List of buffer segments to release.</param>
  28228. </member>
  28229. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.ReleaseBulk(System.Collections.Generic.List{Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment})">
  28230. <summary>
  28231. Releases a list of buffer segments back to the pool in a bulk operation.
  28232. </summary>
  28233. <param name="segments">List of buffer segments to release.</param>
  28234. </member>
  28235. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.Release(System.Byte[])">
  28236. <summary>
  28237. Releases a byte array back to the pool.
  28238. </summary>
  28239. <param name="buffer">Buffer to be released back to the pool.</param>
  28240. </member>
  28241. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.Resize(System.Byte[]@,System.Int32,System.Boolean,System.Boolean,Best.HTTP.Shared.Logger.LoggingContext)">
  28242. <summary>
  28243. Resizes a byte array by returning the old one to the pool and fetching (or creating) a new one of the specified size.
  28244. </summary>
  28245. <param name="buffer">Buffer to resize.</param>
  28246. <param name="newSize">New size for the buffer.</param>
  28247. <param name="canBeLarger">If <c>true</c>, the new buffer can be larger than the specified size.</param>
  28248. <param name="clear">If <c>true</c>, the new buffer will be cleared (set to all zeros).</param>
  28249. <param name="context">Optional context for logging purposes.</param>
  28250. <returns>A resized buffer.</returns>
  28251. </member>
  28252. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.Clear">
  28253. <summary>
  28254. Clears all stored entries in the buffer pool instantly, releasing memory.
  28255. </summary>
  28256. </member>
  28257. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.Maintain">
  28258. <summary>
  28259. Internal method called by the plugin to remove old, non-used buffers.
  28260. </summary>
  28261. </member>
  28262. <member name="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment">
  28263. <summary>
  28264. Represents a segment (a continuous section) of a byte array, providing functionalities to
  28265. work with a portion of the data without copying.
  28266. </summary>
  28267. </member>
  28268. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment.Empty">
  28269. <summary>
  28270. Represents an empty buffer segment.
  28271. </summary>
  28272. </member>
  28273. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment.Data">
  28274. <summary>
  28275. The underlying data of the buffer segment.
  28276. </summary>
  28277. </member>
  28278. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment.Offset">
  28279. <summary>
  28280. The starting offset of the segment within the data.
  28281. </summary>
  28282. </member>
  28283. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment.Count">
  28284. <summary>
  28285. The number of bytes in the segment that contain valid data.
  28286. </summary>
  28287. </member>
  28288. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment.#ctor(System.Byte[],System.Int32,System.Int32)">
  28289. <summary>
  28290. Initializes a new instance of the BufferSegment struct.
  28291. </summary>
  28292. <param name="data">The data for the buffer segment.</param>
  28293. <param name="offset">The starting offset of the segment.</param>
  28294. <param name="count">The number of bytes in the segment.</param>
  28295. </member>
  28296. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment.AsAutoRelease">
  28297. <summary>
  28298. Converts the buffer segment to an AutoReleaseBuffer to use it in a local using statement.
  28299. </summary>
  28300. <returns>A new AutoReleaseBuffer instance containing the data of the buffer segment.</returns>
  28301. </member>
  28302. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment.Slice(System.Int32)">
  28303. <summary>
  28304. Creates a new segment starting from the specified offset.
  28305. </summary>
  28306. <remarks>The new segment will reference the same underlying byte[] as the original, without creating a copy of the data.</remarks>
  28307. <param name="newOffset">The starting offset of the new segment.</param>
  28308. <returns>A new buffer segment that references the same underlying data.</returns>
  28309. </member>
  28310. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment.Slice(System.Int32,System.Int32)">
  28311. <summary>
  28312. Creates a new segment with the specified offset and count.
  28313. </summary>
  28314. <remarks>The new segment will reference the same underlying byte[] as the original, without creating a copy of the data.</remarks>
  28315. <param name="offset">The starting offset of the new segment.</param>
  28316. <param name="count">The number of bytes in the new segment.</param>
  28317. <returns>A new buffer segment that references the same underlying data.</returns>
  28318. </member>
  28319. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment.CopyTo(System.Byte[])">
  28320. <summary>
  28321. Copyies the buffer's content to the received array.
  28322. </summary>
  28323. <param name="to">The array the data will be copied into.</param>
  28324. </member>
  28325. <member name="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferStore">
  28326. <summary>
  28327. Private data struct that contains the size - byte arrays mapping.
  28328. </summary>
  28329. </member>
  28330. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferStore.Size">
  28331. <summary>
  28332. Size/length of the arrays stored in the buffers.
  28333. </summary>
  28334. </member>
  28335. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferStore.buffers">
  28336. <summary>
  28337. </summary>
  28338. </member>
  28339. <member name="M:Best.HTTP.Shared.PlatformSupport.Memory.BufferStore.#ctor(System.Int64,System.Byte[])">
  28340. <summary>
  28341. Create a new store with its first byte[] to store.
  28342. </summary>
  28343. </member>
  28344. <member name="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferDesc">
  28345. <summary>
  28346. Helper struct for <see cref="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferPool"/>.
  28347. </summary>
  28348. </member>
  28349. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferDesc.buffer">
  28350. <summary>
  28351. The actual reference to the stored byte array.
  28352. </summary>
  28353. </member>
  28354. <member name="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferDesc.released">
  28355. <summary>
  28356. When the buffer is put back to the pool. Based on this value the pool will calculate the age of the buffer.
  28357. </summary>
  28358. </member>
  28359. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryResult">
  28360. <summary>
  28361. Represents the result of a DNS query, including the original host name, resolved IP addresses, and any error.
  28362. </summary>
  28363. </member>
  28364. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryResult.HostName">
  28365. <summary>
  28366. The host name used in the DNS query.
  28367. </summary>
  28368. </member>
  28369. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryResult.Addresses">
  28370. <summary>
  28371. The resolved IP addresses associated with the host name.
  28372. </summary>
  28373. </member>
  28374. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryResult.Error">
  28375. <summary>
  28376. Any error that occurred during the DNS query.
  28377. </summary>
  28378. </member>
  28379. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSIPAddress">
  28380. <summary>
  28381. Represents an IP address obtained from DNS resolution.
  28382. </summary>
  28383. </member>
  28384. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSIPAddress.IPAddress">
  28385. <summary>
  28386. The resolved IP address.
  28387. </summary>
  28388. </member>
  28389. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSIPAddress.IsWorkedLastTime">
  28390. <summary>
  28391. Indicates whether this IP address worked during the last connection attempt.
  28392. </summary>
  28393. </member>
  28394. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheOptions">
  28395. <summary>
  28396. Represents options for configuring the DNS cache behavior.
  28397. </summary>
  28398. </member>
  28399. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheOptions.RefreshAfter">
  28400. <summary>
  28401. The time interval after which DNS cache entries should be refreshed.
  28402. </summary>
  28403. </member>
  28404. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheOptions.RemoveAfter">
  28405. <summary>
  28406. The time interval after which DNS cache entries should be removed if not used.
  28407. </summary>
  28408. </member>
  28409. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheOptions.CancellationCheckGranularity">
  28410. <summary>
  28411. The granularity of cancellation checks for DNS queries.
  28412. </summary>
  28413. </member>
  28414. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheOptions.MaintenanceFrequency">
  28415. <summary>
  28416. The frequency of cache maintenance.
  28417. </summary>
  28418. </member>
  28419. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryParameters">
  28420. <summary>
  28421. Represents parameters for a DNS query, including the host name, address, cancellation token, logging context, callback, and tag.
  28422. </summary>
  28423. </member>
  28424. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryParameters.Key">
  28425. <summary>
  28426. The hash key associated with the DNS query.
  28427. </summary>
  28428. </member>
  28429. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryParameters.Hostname">
  28430. <summary>
  28431. The host name used in the DNS query.
  28432. </summary>
  28433. </member>
  28434. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryParameters.Address">
  28435. <summary>
  28436. The URI address used in the DNS query.
  28437. </summary>
  28438. </member>
  28439. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryParameters.Token">
  28440. <summary>
  28441. The cancellation token used to cancel the DNS query.
  28442. </summary>
  28443. </member>
  28444. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryParameters.Context">
  28445. <summary>
  28446. Optional logging context.
  28447. </summary>
  28448. </member>
  28449. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryParameters.Callback">
  28450. <summary>
  28451. The callback to be invoked upon completion of the DNS query.
  28452. </summary>
  28453. </member>
  28454. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryParameters.Tag">
  28455. <summary>
  28456. An optional object reference associated with the DNS query.
  28457. </summary>
  28458. </member>
  28459. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryParameters.IsPrefetch">
  28460. <summary>
  28461. Indicates whether the DNS query is a prefetch query.
  28462. </summary>
  28463. </member>
  28464. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCache">
  28465. <summary>
  28466. The DNSCache class is a static utility that manages DNS caching and queries within the Best HTTP library.
  28467. It helps improve network efficiency by caching DNS query results, reducing the need for redundant DNS resolutions.
  28468. </summary>
  28469. <remarks>
  28470. <para>By utilizing the DNSCache class and its associated features, you can optimize DNS resolution in your network communication, leading to improved performance and reduced latency in your applications.</para>
  28471. <para>
  28472. Its key features include:
  28473. <list type="bullet">
  28474. <item>
  28475. <term>Improving Network Efficiency</term>
  28476. <description>The DNSCache class is designed to enhance network efficiency by caching DNS query results.
  28477. When your application needs to resolve hostnames to IP addresses for making network requests, the DNSCache stores previously resolved results.
  28478. This reduces the need for redundant DNS resolutions, making network communication faster and more efficient.
  28479. </description>
  28480. </item>
  28481. <item>
  28482. <term>DNS Prefetching</term>
  28483. <description>You can use the DNSCache to initiate DNS prefetch operations.
  28484. Prefetching allows you to resolve and cache DNS records for hostnames in advance, reducing latency for future network requests.
  28485. This is particularly useful when you expect to make multiple network requests to the same hostnames, as it helps to avoid DNS resolution delays.
  28486. </description>
  28487. </item>
  28488. <item>
  28489. <term>Marking IP Addresses as Non-Working</term>
  28490. <description>In cases where a previously resolved IP address is determined to be non-functional (e.g., due to network issues), you can use the DNSCache to report IP addresses as non-working.
  28491. This information helps the cache make better decisions about which IP addresses to use for future network connections. <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRingmaster"/> gives higher priority for adresses not marked as non-working.
  28492. </description>
  28493. </item>
  28494. <item>
  28495. <term>Clearing the DNS Cache</term>
  28496. <description>If you need to reset the DNS cache and remove all stored DNS resolutions, you can use the Clear method provided by the DNSCache class.
  28497. This operation can be useful in scenarios where you want to start with a fresh cache.
  28498. </description>
  28499. </item>
  28500. <item>
  28501. <term>Performing DNS Queries</term>
  28502. <description>The primary function of the DNSCache class is to perform DNS queries with specified parameters.
  28503. It resolves DNS records for a given hostname and caches the results. This can be called directly or used internally by the Best HTTP library for resolving hostnames.
  28504. </description>
  28505. </item>
  28506. <item>
  28507. <term>Configuring Cache Behavior</term>
  28508. <description>You can configure the behavior of the DNS cache using the DNSCacheOptions class.
  28509. This includes setting refresh intervals for cache entries, defining the granularity of cancellation checks for DNS queries, and specifying the frequency of cache maintenance.
  28510. </description>
  28511. </item>
  28512. </list>
  28513. </para>
  28514. </remarks>
  28515. </member>
  28516. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCache.Options">
  28517. <summary>
  28518. Options for configuring the DNS cache behavior, including refresh intervals and maintenance frequency.
  28519. </summary>
  28520. </member>
  28521. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCache.Prefetch(System.String)">
  28522. <summary>
  28523. Initiates a DNS prefetch operation for the specified host name. DNS prefetching is used to resolve and cache
  28524. DNS records for host names in advance, reducing latency for future network requests.
  28525. </summary>
  28526. <param name="hostName">The host name to prefetch.</param>
  28527. </member>
  28528. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCache.ReportAsNonWorking(System.String,System.Net.IPAddress,Best.HTTP.Shared.Logger.LoggingContext)">
  28529. <summary>
  28530. Reports an IP address as non-working for the specified host name. In cases where a previously resolved IP address
  28531. is determined to be non-functional, this method updates the cache to mark the IP address as non-working.
  28532. </summary>
  28533. <param name="hostName">The host name associated with the IP address.</param>
  28534. <param name="address">The <see cref="T:System.Net.IPAddress"/> to report as non-working.</param>
  28535. <param name="context">Optional logging context for debugging purposes.</param>
  28536. </member>
  28537. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCache.Clear">
  28538. <summary>
  28539. Clears the DNS cache, removing all cached DNS records. This operation can be used to reset the cache
  28540. and remove all stored DNS resolutions.
  28541. </summary>
  28542. </member>
  28543. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCache.Query(Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSQueryParameters)">
  28544. <summary>
  28545. Performs a DNS query with the specified parameters. It resolves DNS records for a given host name,
  28546. caching the results to reduce the need for redundant DNS resolutions.
  28547. </summary>
  28548. <param name="parameters">The parameters for the DNS query.</param>
  28549. </member>
  28550. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCache.CheckForCanceled(System.DateTime,System.Object)">
  28551. <summary>
  28552. It's plan-b for the case where BeginGetHostAddresses take too long and no reply in time. If the query's Token is canceled it will call the callback if it's still available.
  28553. </summary>
  28554. </member>
  28555. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry">
  28556. <summary>
  28557. Represents a cached entry for DNS query results, including resolved IP addresses and metadata.
  28558. </summary>
  28559. <remarks>
  28560. Almost immutable, all changes are done in-class in a thread-safe manner.
  28561. </remarks>
  28562. </member>
  28563. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.Key">
  28564. <summary>
  28565. Gets the 128-bit hash derived from the host name.
  28566. </summary>
  28567. </member>
  28568. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.Host">
  28569. <summary>
  28570. Gets the host name this entry stores the IP addresses for.
  28571. </summary>
  28572. </member>
  28573. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.ResolvedAt">
  28574. <summary>
  28575. Gets the timestamp when the entry was last resolved.
  28576. </summary>
  28577. </member>
  28578. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.LastUsed">
  28579. <summary>
  28580. Gets the timestamp when the entry was last used by calling <see cref="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.GetAddresses"/>.
  28581. </summary>
  28582. </member>
  28583. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry._resolvedAddresses">
  28584. <summary>
  28585. Resolved IP addresses. It's private, accesible through the <see cref="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.GetAddresses"/> call only.
  28586. </summary>
  28587. </member>
  28588. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry._isRefreshing">
  28589. <summary>
  28590. Flag that is set to <c>true</c> when the cache is refreshing this host.
  28591. </summary>
  28592. <remarks>
  28593. When set to <c>true</c>, <see cref="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.IsStalled(System.DateTime)"/> will always return as non-stalled.
  28594. </remarks>
  28595. </member>
  28596. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.#ctor(UnityEngine.Hash128,System.String,System.Int64,System.Collections.Generic.List{Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSIPAddress})">
  28597. <summary>
  28598. Initializes a new instance of the DNSCacheEntry class.
  28599. </summary>
  28600. <param name="key">The 128-bit hash key derived from the host name.</param>
  28601. <param name="host">The host name associated with this entry.</param>
  28602. <param name="resolvedAddresses">The list of <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSIPAddress"/> containing the resolved IP addresses.</param>
  28603. </member>
  28604. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.DeriveWith(System.Collections.Generic.List{Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSIPAddress})">
  28605. <summary>
  28606. Called to clone the entry. The new entry will inherit the last used timestamp.
  28607. </summary>
  28608. <param name="resolvedAddresses">The list of <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSIPAddress"/> containing the resolved IP addresses.</param>
  28609. <returns>A new DNSCacheEntry instance with updated resolved addresses.</returns>
  28610. </member>
  28611. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.IsStalled(System.DateTime)">
  28612. <summary>
  28613. Checks if the entry is stalled and needs to be refreshed.
  28614. </summary>
  28615. <param name="now">The current timestamp.</param>
  28616. <returns><c>true</c> if the entry is stalled; otherwise, <c>false</c>.</returns>
  28617. <remarks>
  28618. The entry is considered stalled if it is not currently being refreshed (i.e., <see cref="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry._isRefreshing"/> is false)
  28619. and the time since the last resolution exceeds the refresh interval specified in <see cref="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheOptions.RefreshAfter"/>.
  28620. </remarks>
  28621. </member>
  28622. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.IsReadyToRemove(System.DateTime)">
  28623. <summary>
  28624. Checks if the entry is ready to be removed from the cache.
  28625. </summary>
  28626. <param name="now">The current timestamp.</param>
  28627. <returns><c>true</c> if the entry is ready for removal; otherwise, <c>false</c>.</returns>
  28628. <remarks>
  28629. The entry is considered ready for removal if the time since it was last used exceeds the removal interval specified in <see cref="F:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheOptions.RemoveAfter"/>.
  28630. </remarks>
  28631. </member>
  28632. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.Refresh">
  28633. <summary>
  28634. Refreshes the entry by initiating a DNS prefetch (by calling <see cref="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCache.Prefetch(System.String)"/>) for the associated host name.
  28635. </summary>
  28636. <remarks>
  28637. This method initiates a DNS prefetch operation for the host name associated with this entry.
  28638. DNS prefetching is used to resolve and cache DNS records for host names in advance, reducing latency for future network requests.
  28639. </remarks>
  28640. </member>
  28641. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.GetAddresses">
  28642. <summary>
  28643. Gets the resolved IP addresses associated with this entry.
  28644. </summary>
  28645. <returns>An array of <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSIPAddress"/> representing resolved IP addresses.</returns>
  28646. <remarks>
  28647. This method returns the resolved IP addresses associated with this entry and updates the last used timestamp.
  28648. </remarks>
  28649. </member>
  28650. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSCacheEntry.ReportNonWorking(System.Net.IPAddress,Best.HTTP.Shared.Logger.LoggingContext)">
  28651. <summary>
  28652. Reports an IP address as non-working for the specified host name. In cases where a previously resolved IP address
  28653. is determined to be non-functional, this method updates the cache to mark the IP address as non-working.
  28654. </summary>
  28655. <param name="nonWorking">The non-working IP address to report.</param>
  28656. <param name="context">Optional logging context for debugging purposes.</param>
  28657. <remarks>
  28658. This method is used to report an IP address associated with a host name as non-working.
  28659. When a previously resolved IP address is determined to be non-functional, this method updates the cache to mark the IP address as non-working.
  28660. It can be useful in situations where network errors or issues with specific IP addresses need to be recorded and managed.
  28661. </remarks>
  28662. </member>
  28663. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IPeekableContentProvider">
  28664. <summary>
  28665. The IPeekableContentProvider interface defines an abstraction for providing content to an <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer"/> with the ability to peek at the content without consuming it.
  28666. It is an essential part of content streaming over a TCP connection.
  28667. </summary>
  28668. <remarks>
  28669. <para>
  28670. Key Functions of IPeekableContentProvider:
  28671. </para>
  28672. <list type="bullet">
  28673. <item>
  28674. <term>Content Provision</term><description>It provides content to an associated <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer"/> without immediately consuming the content. This allows the consumer to examine the data before processing.
  28675. </description></item>
  28676. <item>
  28677. <term>Two-Way Binding</term><description>Supports establishing a two-way binding between the <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IPeekableContentProvider"/> and an <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer"/>, enabling bidirectional communication between the provider and consumer.
  28678. </description></item>
  28679. <item>
  28680. <term>Unbinding</term><description>Provides methods for unbinding a content consumer, terminating the association between the provider and consumer.
  28681. </description></item>
  28682. </list>
  28683. </remarks>
  28684. </member>
  28685. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IPeekableContentProvider.Peekable">
  28686. <summary>
  28687. Gets the <see cref="T:Best.HTTP.Shared.Streams.PeekableContentProviderStream"/> associated with this content provider, which allows peeking at the content without consuming it.
  28688. </summary>
  28689. </member>
  28690. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IPeekableContentProvider.Consumer">
  28691. <summary>
  28692. Gets the <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer"/> implementor that will be notified through <see cref="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer.OnContent"/> calls when new data is available in the TCPStreamer.
  28693. </summary>
  28694. </member>
  28695. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IPeekableContentProvider.SetTwoWayBinding(Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer)">
  28696. <summary>
  28697. Sets up a two-way binding between this content provider and an <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer"/>. This enables bidirectional communication between the provider and consumer.
  28698. </summary>
  28699. <param name="consumer">The <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer"/> to bind to.</param>
  28700. </member>
  28701. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IPeekableContentProvider.Unbind">
  28702. <summary>
  28703. Unbinds the content provider from its associated content consumer. This terminates the association between the provider and consumer.
  28704. </summary>
  28705. </member>
  28706. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IPeekableContentProvider.UnbindIf(Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer)">
  28707. <summary>
  28708. Unbinds the content provider from a specific content consumer if it is currently bound to that consumer.
  28709. </summary>
  28710. <param name="consumer">The <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer"/> to unbind from.</param>
  28711. </member>
  28712. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer">
  28713. <summary>
  28714. The IContentConsumer interface represents a consumer of content provided by an <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IPeekableContentProvider"/>. It defines methods for handling received content and connection-related events.
  28715. </summary>
  28716. <remarks>
  28717. <para>
  28718. Key Functions of IContentConsumer:
  28719. </para>
  28720. <list type="bullet">
  28721. <item>
  28722. <term>Content Handling</term><description>Defines methods for handling incoming content, allowing consumers to process data as it becomes available.
  28723. </description></item>
  28724. <item>
  28725. <term>Connection Management</term><description>Provides event methods to notify consumers of connection closure and error conditions, facilitating graceful handling of connection-related issues.
  28726. </description></item>
  28727. </list>
  28728. </remarks>
  28729. </member>
  28730. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer.ContentProvider">
  28731. <summary>
  28732. Gets the <see cref="T:Best.HTTP.Shared.Streams.PeekableContentProviderStream"/> associated with this content consumer, which allows access to incoming content.
  28733. </summary>
  28734. </member>
  28735. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer.SetBinding(Best.HTTP.Shared.Streams.PeekableContentProviderStream)">
  28736. <summary>
  28737. This method should not be called directly. It is used internally to set the binding between the content consumer and its associated content provider.
  28738. </summary>
  28739. <param name="contentProvider">The <see cref="T:Best.HTTP.Shared.Streams.PeekableContentProviderStream"/> to bind to.</param>
  28740. </member>
  28741. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer.UnsetBinding">
  28742. <summary>
  28743. This method should not be called directly. It is used internally to unset the binding between the content consumer and its associated content provider.
  28744. </summary>
  28745. </member>
  28746. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer.OnContent">
  28747. <summary>
  28748. Called when new content is available from the associated content provider.
  28749. </summary>
  28750. </member>
  28751. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer.OnConnectionClosed">
  28752. <summary>
  28753. Called when the connection is closed by the remote peer. It notifies the content consumer about the connection closure.
  28754. </summary>
  28755. </member>
  28756. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer.OnError(System.Exception)">
  28757. <summary>
  28758. Called when an error occurs during content processing or connection handling. It provides the exception that caused the error.
  28759. </summary>
  28760. <param name="ex">The <see cref="T:System.Exception"/> that represents the error condition.</param>
  28761. </member>
  28762. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationSteps">
  28763. <summary>
  28764. Represents the different steps of the negotiation process.
  28765. </summary>
  28766. </member>
  28767. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.INegotiationPeer">
  28768. <summary>
  28769. Interface for a peer that participates in the negotiation process.
  28770. </summary>
  28771. </member>
  28772. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.INegotiationPeer.GetSupportedProtocolNames(Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator)">
  28773. <summary>
  28774. Gets the list of supported ALPN protocol names for negotiation.
  28775. </summary>
  28776. <param name="negotiator">The negotiation instance.</param>
  28777. <returns>A list of supported ALPN protocol names.</returns>
  28778. </member>
  28779. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.INegotiationPeer.MustStopAdvancingToNextStep(Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator,Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationSteps,Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationSteps,System.Exception)">
  28780. <summary>
  28781. Indicates whether the negotiation process must stop advancing to the next step.
  28782. </summary>
  28783. <param name="negotiator">The negotiation instance.</param>
  28784. <param name="finishedStep">The step that has just finished.</param>
  28785. <param name="nextStep">The next step in the negotiation process.</param>
  28786. <param name="error">An optional error encountered during negotiation.</param>
  28787. <returns><c>true</c> if negotiation must stop for any reason advancing to the next step; otherwise, <c>false</c>.</returns>
  28788. </member>
  28789. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.INegotiationPeer.EvaluateProxyNegotiationFailure(Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator,System.Exception,System.Boolean)">
  28790. <summary>
  28791. Handles the evaluation of a proxy negotiation failure.
  28792. </summary>
  28793. <param name="negotiator">The negotiation instance.</param>
  28794. <param name="error">The error encountered during proxy negotiation.</param>
  28795. <param name="resendForAuthentication">Indicates whether to resend for authentication.</param>
  28796. </member>
  28797. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.INegotiationPeer.OnNegotiationFailed(Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator,System.Exception)">
  28798. <summary>
  28799. Handles the negotiation failure.
  28800. </summary>
  28801. <param name="negotiator">The negotiation instance.</param>
  28802. <param name="error">The error encountered during negotiation.</param>
  28803. </member>
  28804. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.INegotiationPeer.OnNegotiationFinished(Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator,Best.HTTP.Shared.Streams.PeekableContentProviderStream,Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer,System.String)">
  28805. <summary>
  28806. Handles the successful completion of negotiation.
  28807. </summary>
  28808. <param name="negotiator">The negotiation instance.</param>
  28809. <param name="stream">The negotiated stream.</param>
  28810. <param name="streamer">The TCP streamer.</param>
  28811. <param name="negotiatedProtocol">The negotiated protocol.</param>
  28812. </member>
  28813. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationParameters">
  28814. <summary>
  28815. Represents the parameters for a negotiation.
  28816. </summary>
  28817. </member>
  28818. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationParameters.proxy">
  28819. <summary>
  28820. Optional proxy instance must be used during negotiation.
  28821. </summary>
  28822. </member>
  28823. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationParameters.createProxyTunel">
  28824. <summary>
  28825. Sets a value indicating whether to create a proxy tunnel.
  28826. </summary>
  28827. </member>
  28828. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationParameters.targetUri">
  28829. <summary>
  28830. Sets the target URI for negotiation.
  28831. </summary>
  28832. </member>
  28833. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationParameters.negotiateTLS">
  28834. <summary>
  28835. Sets a value indicating whether to negotiate TLS.
  28836. </summary>
  28837. </member>
  28838. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationParameters.token">
  28839. <summary>
  28840. Sets the cancellation token for negotiation.
  28841. </summary>
  28842. </member>
  28843. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationParameters.hostSettings">
  28844. <summary>
  28845. Sets the <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/> that can be used during the negotiation process.
  28846. </summary>
  28847. </member>
  28848. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationParameters.context">
  28849. <summary>
  28850. Optional logging context for debugging purposes.
  28851. </summary>
  28852. </member>
  28853. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator">
  28854. <summary>
  28855. <para>The Negotiator class acts as a central coordinator for the negotiation of network connections, abstracting away the complexities of DNS resolution, TCP socket creation, proxy negotiation, and TLS setup.
  28856. It allows for customization and extensibility, making it a versatile tool for establishing network connections in a flexible and controlled manner.</para>
  28857. <list type="bullet">
  28858. <item><description>The Negotiator class represents a component responsible for managing the negotiation process. It helps facilitate communication with various network layers, such as DNS resolution, TCP socket creation, proxy handling, and TLS negotiation.</description></item>
  28859. <item><description>The class is designed to be flexible and extensible by allowing developers to define a custom negotiation peer that implements the INegotiationPeer interface. This allows developers to adapt the negotiation process to specific requirements and protocols.</description></item>
  28860. <item><description>It orchestrates the negotiation process through a series of steps defined by the NegotiationSteps enum. These steps include DNSQuery, TCPRace, Proxy, TLSNegotiation</description></item>
  28861. <item><description>Handles errors and exceptions that may occur during negotiation, ensuring graceful fallback or termination of the negotiation process when necessary.</description></item>
  28862. <item><description>When TLS negotiation is required, it selects the appropriate TLS negotiation method based on the configuration and available options, such as BouncyCastle or the system's TLS framework.</description></item>
  28863. <item><description>If a proxy is configured, the Negotiator class handles proxy negotiation and tunneling, allowing communication through a proxy server.</description></item>
  28864. <item><description>It supports cancellation through a CancellationToken, allowing the negotiation process to be canceled if needed.</description></item>
  28865. <item><description>The class uses extensive logging to provide information about the progress and outcomes of the negotiation process, making it easier to diagnose and debug issues.</description></item>
  28866. </list>
  28867. </summary>
  28868. </member>
  28869. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator.Peer">
  28870. <summary>
  28871. Gets the negotiation peer associated with this negotiator.
  28872. </summary>
  28873. </member>
  28874. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator.Parameters">
  28875. <summary>
  28876. Gets the negotiation parameters for this negotiator.
  28877. </summary>
  28878. </member>
  28879. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator.Streamer">
  28880. <summary>
  28881. Gets the TCP streamer associated with this negotiator.
  28882. </summary>
  28883. </member>
  28884. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator.Stream">
  28885. <summary>
  28886. Gets the peekable content provider stream associated with this negotiator.
  28887. </summary>
  28888. </member>
  28889. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator.#ctor(Best.HTTP.Shared.PlatformSupport.Network.Tcp.INegotiationPeer,Best.HTTP.Shared.PlatformSupport.Network.Tcp.NegotiationParameters)">
  28890. <summary>
  28891. Initializes a new instance of the Negotiator class.
  28892. </summary>
  28893. <param name="peer">The negotiation peer for this negotiator.</param>
  28894. <param name="parameters">The negotiation parameters for this negotiator.</param>
  28895. </member>
  28896. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator.Start">
  28897. <summary>
  28898. Starts the negotiation process.
  28899. </summary>
  28900. </member>
  28901. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator.OnCancellationRequested">
  28902. <summary>
  28903. Handles cancellation requests during negotiation.
  28904. </summary>
  28905. </member>
  28906. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Streams.NonblockingTCPStream">
  28907. <summary>
  28908. A non-blocking-read stream over a TCPStreamer that buffers the received bytes from the network in a Peekable stream.
  28909. </summary>
  28910. </member>
  28911. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRingmasterSettings">
  28912. <summary>
  28913. Contains settings related to TCP Ringmaster, which manages and optimizes TCP connections.
  28914. </summary>
  28915. </member>
  28916. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRingmasterSettings.MaxSimultaneousRacers">
  28917. <summary>
  28918. The maximum number of simultaneous TCP racers. Racers are used to establish and manage connections.
  28919. </summary>
  28920. </member>
  28921. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRingmasterSettings.ShuffleAddresses">
  28922. <summary>
  28923. Determines whether to shuffle addresses before assigning racing lanes.
  28924. </summary>
  28925. </member>
  28926. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRingmasterSettings.CustomAddressShuffleAlgorithm">
  28927. <summary>
  28928. Callback to implement a custom address shuffle algorithm. When assigned, no plugin-defined shuffle algorithm will be executed.
  28929. </summary>
  28930. <remarks>It must be thread-safe.</remarks>
  28931. </member>
  28932. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRingmasterSettings.CancellationCheckingGranularity">
  28933. <summary>
  28934. The granularity of cancellation checking for TCP races. It specifies the time interval for checking if a race should be canceled.
  28935. </summary>
  28936. </member>
  28937. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceResult">
  28938. <summary>
  28939. Represents the result of a TCP race competition, including the winning socket or an error.
  28940. </summary>
  28941. </member>
  28942. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceResult.WinningSocket">
  28943. <summary>
  28944. The socket that won the race competition, if available.
  28945. </summary>
  28946. </member>
  28947. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceResult.Error">
  28948. <summary>
  28949. The error encountered during the race competition, if any.
  28950. </summary>
  28951. </member>
  28952. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceResult.#ctor(System.Net.Sockets.Socket,System.Exception)">
  28953. <summary>
  28954. Initializes a new instance of the <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceResult"/> class with the winning socket and an error, if any.
  28955. </summary>
  28956. <param name="socket">The winning socket of the race competition, if available.</param>
  28957. <param name="ex">The error encountered during the race competition, if any.</param>
  28958. </member>
  28959. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Race">
  28960. <summary>
  28961. Represents a TCP race competition with parameters and status.
  28962. </summary>
  28963. </member>
  28964. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Race.Parameters">
  28965. <summary>
  28966. The parameters for the TCP race competition.
  28967. </summary>
  28968. </member>
  28969. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Race.NextAddressIndex">
  28970. <summary>
  28971. The index of the next address to connect to.
  28972. </summary>
  28973. </member>
  28974. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Race.RunningLanes">
  28975. <summary>
  28976. The number of running lanes in the competition.
  28977. </summary>
  28978. </member>
  28979. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.RacingLane">
  28980. <summary>
  28981. Represents a racing lane in a TCP race competition.
  28982. </summary>
  28983. </member>
  28984. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.RacingLane.Race">
  28985. <summary>
  28986. The associated race and its parameters.
  28987. </summary>
  28988. </member>
  28989. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.RacingLane.AddressIndex">
  28990. <summary>
  28991. The index of the address to connect to.
  28992. </summary>
  28993. </member>
  28994. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.RacingLane.LaneIndex">
  28995. <summary>
  28996. The index of the racing lane.
  28997. </summary>
  28998. </member>
  28999. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.RacingLane.Socket">
  29000. <summary>
  29001. The socket used for the racing lane.
  29002. </summary>
  29003. </member>
  29004. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceParameters">
  29005. <summary>
  29006. Contains parameters and settings for a TCP race competition to establish connections.
  29007. </summary>
  29008. </member>
  29009. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceParameters.Addresses">
  29010. <summary>
  29011. An array of DNS IP addresses to be used for racing to establish a connection.
  29012. </summary>
  29013. </member>
  29014. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceParameters.Hostname">
  29015. <summary>
  29016. The hostname to connect to.
  29017. </summary>
  29018. </member>
  29019. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceParameters.Port">
  29020. <summary>
  29021. The port to connect to.
  29022. </summary>
  29023. </member>
  29024. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceParameters.Token">
  29025. <summary>
  29026. The cancellation token used to cancel the TCP race competition.
  29027. </summary>
  29028. </member>
  29029. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceParameters.AnnounceWinnerCallback">
  29030. <summary>
  29031. A callback function to announce the winner of the TCP race competition.
  29032. </summary>
  29033. <param name="parameters">The TCPRaceParameters used for the race competition.</param>
  29034. <param name="result">The result of the race competition, including the winning socket or an error.</param>
  29035. </member>
  29036. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceParameters.Context">
  29037. <summary>
  29038. Optional context for logging and tracking purposes.
  29039. </summary>
  29040. </member>
  29041. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceParameters.Tag">
  29042. <summary>
  29043. A user-defined tag associated with the TCP race parameters.
  29044. </summary>
  29045. </member>
  29046. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRingmaster">
  29047. <summary>
  29048. <para>TCPRingmaster provides a method called <see cref="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRingmaster.StartCompetion(Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceParameters)"/>, which is used to initiate a competition among multiple TCP connections.
  29049. Each connection attempt races against the others to establish a connection, and the first successful connection is considered the winner.</para>
  29050. The class allows to specify a callback function (through <see cref="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceParameters.AnnounceWinnerCallback"/>) that gets invoked when a winning connection is established or when the competition is canceled.
  29051. This callback can be used to take action based on the competition outcome.
  29052. <para>Additionally it includes logic for optimizing the order in which connection attempts are made:
  29053. <list type="bullet">
  29054. <item><description>It can shuffle the order of addresses to improve the chances of quickly finding a working address.</description></item>
  29055. <item><description>It handles scenarios where some addresses may not be working and prioritizes working addresses.</description></item>
  29056. </list>
  29057. </para>
  29058. </summary>
  29059. </member>
  29060. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRingmaster.StartCompetion(Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRaceParameters)">
  29061. <summary>
  29062. Starts a TCP race competition to establish connections based on the provided parameters.
  29063. </summary>
  29064. <param name="parameters">The parameters and settings for the TCP race competition.</param>
  29065. </member>
  29066. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPRingmaster.ShuffleAddresses(Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSIPAddress[])">
  29067. <summary>
  29068. Inplace shuffles addresses.
  29069. </summary>
  29070. <param name="addresses">The array of <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache.DNSIPAddress"/> to shuffle.</param>
  29071. </member>
  29072. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.ITCPStreamerContentConsumer">
  29073. <summary>
  29074. The ITCPStreamerContentConsumer interface represents a specialized content consumer for use with <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/>. It offers methods for writing data to the streamer and handling content-related events.
  29075. </summary>
  29076. <remarks>
  29077. <para>
  29078. Key Functions of ITCPStreamerContentConsumer:
  29079. </para>
  29080. <list type="bullet">
  29081. <item>
  29082. <term>Data Writing</term><description>Provides methods to write data to the associated <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance, allowing content to be sent over the TCP connection.
  29083. </description></item>
  29084. <item>
  29085. <term>Content Handling</term><description>Defines event methods for notifying consumers when new content is available, the connection is closed, or errors occur during data transfer.
  29086. </description></item>
  29087. </list>
  29088. </remarks>
  29089. <seealso cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/>
  29090. </member>
  29091. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.ITCPStreamerContentConsumer.Write(System.Byte[],System.Int32,System.Int32)">
  29092. <summary>
  29093. Writes the specified data buffer to the associated <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance. The data is copied into a new buffer and passed to the streamer for transmission.
  29094. </summary>
  29095. <param name="buffer">The byte array containing the data to be written.</param>
  29096. <param name="offset">The zero-based byte offset in the buffer from which to begin writing.</param>
  29097. <param name="count">The number of bytes to write from the buffer.</param>
  29098. </member>
  29099. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.ITCPStreamerContentConsumer.Write(Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment)">
  29100. <summary>
  29101. Writes the specified <see cref="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment"/> directly to the associated <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance. The content of the buffer is passed to the streamer for transmission, and the ownership of the buffer is transferred to the <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> too.
  29102. </summary>
  29103. <param name="buffer">The <see cref="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment"/> containing the data to be written.</param>
  29104. </member>
  29105. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.ITCPStreamerContentConsumer.OnContent(Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer)">
  29106. <summary>
  29107. Called when new content is available from the associated <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance.
  29108. </summary>
  29109. <param name="streamer">The <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance providing the content.</param>
  29110. </member>
  29111. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.ITCPStreamerContentConsumer.OnConnectionClosed(Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer)">
  29112. <summary>
  29113. Called when the connection is closed by the remote peer. It notifies the content consumer about the connection closure.
  29114. </summary>
  29115. <param name="streamer">The <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance for which the connection is closed.</param>
  29116. </member>
  29117. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.ITCPStreamerContentConsumer.OnError(Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer,System.Exception)">
  29118. <summary>
  29119. Called when an error occurs during content processing or connection handling. It provides the <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance and the <see cref="T:System.Exception"/> that caused the error.
  29120. </summary>
  29121. <param name="streamer">The <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance where the error occurred.</param>
  29122. <param name="ex">The <see cref="T:System.Exception"/> that represents the error condition.</param>
  29123. </member>
  29124. <member name="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer">
  29125. <summary>
  29126. The TCPStreamer class is a versatile component that abstracts the complexities of TCP communication, making it easier to handle data streaming between networked applications or devices. It ensures reliable and efficient data transfer while handling various aspects of network communication and error management.
  29127. </summary>
  29128. <remarks>
  29129. <para>
  29130. TCPStreamer serves several key functions:
  29131. </para>
  29132. <list type="bullet">
  29133. <item>
  29134. <term>Data Streaming</term><description>It enables the streaming of data between two endpoints over a TCP connection, ideal for scenarios involving the transfer of large data volumes in manageable chunks.
  29135. </description></item>
  29136. <item>
  29137. <term>Buffer Management</term><description>The class efficiently manages buffering for both incoming and outgoing data, ensuring smooth and efficient data transfer.
  29138. </description></item>
  29139. <item>
  29140. <term>Asynchronous Communication</term><description>Utilizing asynchronous communication patterns, it supports non-blocking operations, essential for applications requiring concurrent data processing.
  29141. </description></item>
  29142. <item>
  29143. <term>Error Handling</term><description>Comprehensive error-handling mechanisms address exceptions that may occur during TCP communication, enhancing robustness in the face of network issues or errors.
  29144. </description></item>
  29145. <item>
  29146. <term>Resource Management</term><description>It handles memory buffer management and resource disposal when the TCP connection is closed or the class is disposed.
  29147. </description></item>
  29148. <item>
  29149. <term>Integration with Heartbeat</term><description>Implementing the <see cref="T:Best.HTTP.Shared.Extensions.IHeartbeat"/> interface, it can be seamlessly integrated into systems using heartbeat mechanisms for network connection monitoring and management.
  29150. </description></item>
  29151. </list>
  29152. </remarks>
  29153. </member>
  29154. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.ContentConsumer">
  29155. <summary>
  29156. Gets or sets the content consumer that interacts with this <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance, allowing data to be written to the streamer for transmission.
  29157. </summary>
  29158. </member>
  29159. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.Socket">
  29160. <summary>
  29161. Gets the underlying <see cref="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.Socket"/> associated with this <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance.
  29162. </summary>
  29163. </member>
  29164. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.Context">
  29165. <summary>
  29166. Gets the optional <see cref="T:Best.HTTP.Shared.Logger.LoggingContext"/> associated with this <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance, facilitating logging and diagnostics.
  29167. </summary>
  29168. </member>
  29169. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.IsConnectionClosed">
  29170. <summary>
  29171. Gets a value indicating whether the TCP connection is closed.
  29172. </summary>
  29173. </member>
  29174. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.MinReceiveBufferSize">
  29175. <summary>
  29176. Gets the minimum receive buffer size for the TCP socket.
  29177. </summary>
  29178. </member>
  29179. <member name="P:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.Length">
  29180. <summary>
  29181. Gets the total length of buffered data for reading from the stream.
  29182. </summary>
  29183. </member>
  29184. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.MaxBufferedReadAmount">
  29185. <summary>
  29186. Gets or sets the maximum amount of buffered data allowed for reading from the stream.
  29187. </summary>
  29188. </member>
  29189. <member name="F:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.MaxBufferedWriteAmount">
  29190. <summary>
  29191. Gets or sets the maximum amount of buffered data allowed for writing to the stream.
  29192. </summary>
  29193. </member>
  29194. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.#ctor(System.Net.Sockets.Socket,System.UInt32,System.UInt32,Best.HTTP.Shared.Logger.LoggingContext)">
  29195. <summary>
  29196. Initializes a new instance of the TCPStreamer class with the specified <see cref="T:System.Net.Sockets.Socket"/> and parent <see cref="T:Best.HTTP.Shared.Logger.LoggingContext"/>.
  29197. </summary>
  29198. <param name="socket">The underlying <see cref="T:System.Net.Sockets.Socket"/> representing the TCP connection.</param>
  29199. <param name="parentLoggingContext">The optional parent <see cref="T:Best.HTTP.Shared.Logger.LoggingContext"/> for logging and diagnostics.</param>
  29200. </member>
  29201. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.DequeueReceived">
  29202. <summary>
  29203. Dequeues received data from the stream's buffer and returns a <see cref="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment"/> containing the data.
  29204. </summary>
  29205. <returns>A <see cref="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment"/> containing the received data.</returns>
  29206. </member>
  29207. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.BeginReceive">
  29208. <summary>
  29209. Begins receiving data from the TCP connection asynchronously. This method ensures that only one receive operation happens at a time.
  29210. </summary>
  29211. <remarks>
  29212. When calling this method, it ensures that there is only one active receive operation at a time, preventing overlapping receives. This optimization helps prevent data loss and improves the reliability of the receive process.
  29213. </remarks>
  29214. </member>
  29215. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.EnqueueToSend(Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment)">
  29216. <summary>
  29217. Enqueues data to be sent over the TCP connection. The data is added to the stream's outgoing buffer for transmission.
  29218. </summary>
  29219. <param name="buffer">The <see cref="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment"/> containing the data to be sent.</param>
  29220. </member>
  29221. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.Dispose">
  29222. <summary>
  29223. Disposes of the <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> instance, releasing associated resources.
  29224. </summary>
  29225. </member>
  29226. <member name="M:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer.Close">
  29227. <summary>
  29228. Closes the TCP connection gracefully and performs cleanup operations.
  29229. </summary>
  29230. </member>
  29231. <member name="T:Best.HTTP.Shared.PlatformSupport.Text.StringBuilderPool">
  29232. <summary>
  29233. Implements pooling logic for <see cref="T:System.Text.StringBuilder"/> instances.
  29234. </summary>
  29235. </member>
  29236. <member name="P:Best.HTTP.Shared.PlatformSupport.Text.StringBuilderPool.IsEnabled">
  29237. <summary>
  29238. Setting this property to false the pooling mechanism can be disabled.
  29239. </summary>
  29240. </member>
  29241. <member name="F:Best.HTTP.Shared.PlatformSupport.Text.StringBuilderPool.RemoveOlderThan">
  29242. <summary>
  29243. Buffer entries that released back to the pool and older than this value are moved when next maintenance is triggered.
  29244. </summary>
  29245. </member>
  29246. <member name="F:Best.HTTP.Shared.PlatformSupport.Text.StringBuilderPool.RunMaintenanceEvery">
  29247. <summary>
  29248. How often pool maintenance must run.
  29249. </summary>
  29250. </member>
  29251. <member name="T:Best.HTTP.Shared.Streams.BufferPoolMemoryStream">
  29252. <summary>
  29253. This is a modified MemoryStream class to use VariableSizedBufferPool
  29254. </summary>
  29255. </member>
  29256. <member name="T:Best.HTTP.Shared.Streams.PeekableContentProviderStream">
  29257. <summary>
  29258. A PeekableStream implementation that also implements the <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.IPeekableContentProvider"/> interface too.
  29259. </summary>
  29260. </member>
  29261. <member name="M:Best.HTTP.Shared.Streams.PeekableContentProviderStream.Unbind">
  29262. <summary>
  29263. This will set Consumer to null.
  29264. </summary>
  29265. </member>
  29266. <member name="M:Best.HTTP.Shared.Streams.PeekableContentProviderStream.UnbindIf(Best.HTTP.Shared.PlatformSupport.Network.Tcp.IContentConsumer)">
  29267. <summary>
  29268. Set Consumer to null if the current one is the one passed in the parameter.
  29269. </summary>
  29270. </member>
  29271. <member name="T:Best.HTTP.Shared.Streams.StreamList">
  29272. <summary>
  29273. Wrapper of multiple streams. Writes and reads are both supported. Read goes trough all the streams.
  29274. </summary>
  29275. </member>
  29276. <member name="T:Best.HTTP.Shared.Streams.WriteOnlyBufferedStream">
  29277. <summary>
  29278. A custom buffer stream implementation that will not close the underlying stream.
  29279. </summary>
  29280. </member>
  29281. <member name="M:Best.HTTP.Shared.TLS.AbstractTls13Client.GetNegotiatedApplicationProtocol">
  29282. <summary>
  29283. TCPConnector has to know what protocol got negotiated
  29284. </summary>
  29285. </member>
  29286. <member name="T:Best.HTTP.Shared.TLS.Crypto.Impl.FastAesEngine">
  29287. an implementation of the AES (Rijndael), from FIPS-197.
  29288. <p>
  29289. For further details see: <a href="http://csrc.nist.gov/encryption/aes/">http://csrc.nist.gov/encryption/aes/</a>.
  29290. This implementation is based on optimizations from Dr. Brian Gladman's paper and C code at
  29291. <a href="http://fp.gladman.plus.com/cryptography_technology/rijndael/">http://fp.gladman.plus.com/cryptography_technology/rijndael/</a>
  29292. There are three levels of tradeoff of speed vs memory
  29293. Because java has no preprocessor, they are written as three separate classes from which to choose
  29294. The fastest uses 8Kbytes of static tables to precompute round calculations, 4 256 word tables for encryption
  29295. and 4 for decryption.
  29296. The middle performance version uses only one 256 word table for each, for a total of 2Kbytes,
  29297. adding 12 rotate operations per round to compute the values contained in the other tables from
  29298. the contents of the first.
  29299. The slowest version uses no static tables at all and computes the values in each round.
  29300. </p>
  29301. <p>
  29302. This file contains the middle performance version with 2Kbytes of static tables for round precomputation.
  29303. </p>
  29304. </member>
  29305. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastAesEngine.GenerateWorkingKey(System.Byte[],System.Boolean)">
  29306. Calculate the necessary round keys
  29307. The number of calculations depends on key size and block size
  29308. AES specified a fixed block size of 128 bits and key sizes 128/192/256 bits
  29309. This code is written assuming those are the only possible values
  29310. </member>
  29311. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastAesEngine.#ctor">
  29312. default constructor - 128 bit block size.
  29313. </member>
  29314. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastAesEngine.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  29315. initialise an AES cipher.
  29316. @param forEncryption whether or not we are for encryption.
  29317. @param parameters the parameters required to set up the cipher.
  29318. @exception ArgumentException if the parameters argument is
  29319. inappropriate.
  29320. </member>
  29321. <member name="T:Best.HTTP.Shared.TLS.Crypto.Impl.FastCcmBlockCipher">
  29322. Implements the Counter with Cipher Block Chaining mode (CCM) detailed in
  29323. NIST Special Publication 800-38C.
  29324. <p>
  29325. <b>Note</b>: this mode is a packet mode - it needs all the data up front.
  29326. </p>
  29327. </member>
  29328. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastCcmBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  29329. Basic constructor.
  29330. @param cipher the block cipher to be used.
  29331. </member>
  29332. <member name="P:Best.HTTP.Shared.TLS.Crypto.Impl.FastCcmBlockCipher.UnderlyingCipher">
  29333. return the underlying block cipher that we are wrapping.
  29334. @return the underlying block cipher that we are wrapping.
  29335. </member>
  29336. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastCcmBlockCipher.GetMac">
  29337. Returns a byte array containing the mac calculated as part of the
  29338. last encrypt or decrypt operation.
  29339. @return the last mac calculated.
  29340. </member>
  29341. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastCcmBlockCipher.ProcessPacket(System.Byte[],System.Int32,System.Int32)">
  29342. Process a packet of data for either CCM decryption or encryption.
  29343. @param in data for processing.
  29344. @param inOff offset at which data starts in the input array.
  29345. @param inLen length of the data in the input array.
  29346. @return a byte array containing the processed input..
  29347. @throws IllegalStateException if the cipher is not appropriately set up.
  29348. @throws InvalidCipherTextException if the input data is truncated or the mac check fails.
  29349. </member>
  29350. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastCcmBlockCipher.ProcessPacket(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  29351. Process a packet of data for either CCM decryption or encryption.
  29352. @param in data for processing.
  29353. @param inOff offset at which data starts in the input array.
  29354. @param inLen length of the data in the input array.
  29355. @param output output array.
  29356. @param outOff offset into output array to start putting processed bytes.
  29357. @return the number of bytes added to output.
  29358. @throws IllegalStateException if the cipher is not appropriately set up.
  29359. @throws InvalidCipherTextException if the input data is truncated or the mac check fails.
  29360. @throws DataLengthException if output buffer too short.
  29361. </member>
  29362. <member name="T:Best.HTTP.Shared.TLS.Crypto.Impl.FastChaCha7539Engine">
  29363. <summary>
  29364. Implementation of Daniel J. Bernstein's ChaCha stream cipher.
  29365. </summary>
  29366. </member>
  29367. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastChaCha7539Engine.#ctor">
  29368. <summary>
  29369. Creates a 20 rounds ChaCha engine.
  29370. </summary>
  29371. </member>
  29372. <member name="T:Best.HTTP.Shared.TLS.Crypto.Impl.FastChaChaEngine">
  29373. <summary>
  29374. Implementation of Daniel J. Bernstein's ChaCha stream cipher.
  29375. </summary>
  29376. </member>
  29377. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastChaChaEngine.#ctor">
  29378. <summary>
  29379. Creates a 20 rounds ChaCha engine.
  29380. </summary>
  29381. </member>
  29382. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastChaChaEngine.#ctor(System.Int32)">
  29383. <summary>
  29384. Creates a ChaCha engine with a specific number of rounds.
  29385. </summary>
  29386. <param name="rounds">the number of rounds (must be an even number).</param>
  29387. </member>
  29388. <member name="T:Best.HTTP.Shared.TLS.Crypto.Impl.FastGcmBlockCipher">
  29389. <summary>
  29390. Implements the Galois/Counter mode (GCM) detailed in NIST Special Publication 800-38D.
  29391. </summary>
  29392. </member>
  29393. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastGcmBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  29394. <remarks>
  29395. MAC sizes from 32 bits to 128 bits (must be a multiple of 8) are supported. The default is 128 bits.
  29396. Sizes less than 96 are not recommended, but are supported for specialized applications.
  29397. </remarks>
  29398. </member>
  29399. <member name="T:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305">
  29400. <summary>
  29401. Poly1305 message authentication code, designed by D. J. Bernstein.
  29402. </summary>
  29403. <remarks>
  29404. Poly1305 computes a 128-bit (16 bytes) authenticator, using a 128 bit nonce and a 256 bit key
  29405. consisting of a 128 bit key applied to an underlying cipher, and a 128 bit key (with 106
  29406. effective key bits) used in the authenticator.
  29407. The polynomial calculation in this implementation is adapted from the public domain <a
  29408. href="https://github.com/floodyberry/poly1305-donna">poly1305-donna-unrolled</a> C implementation
  29409. by Andrew M (@floodyberry).
  29410. </remarks>
  29411. <seealso cref="T:Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator"/>
  29412. </member>
  29413. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.r0">
  29414. Polynomial key
  29415. </member>
  29416. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.r1">
  29417. Polynomial key
  29418. </member>
  29419. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.r2">
  29420. Polynomial key
  29421. </member>
  29422. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.r3">
  29423. Polynomial key
  29424. </member>
  29425. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.r4">
  29426. Polynomial key
  29427. </member>
  29428. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.s1">
  29429. Precomputed 5 * r[1..4]
  29430. </member>
  29431. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.s2">
  29432. Precomputed 5 * r[1..4]
  29433. </member>
  29434. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.s3">
  29435. Precomputed 5 * r[1..4]
  29436. </member>
  29437. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.s4">
  29438. Precomputed 5 * r[1..4]
  29439. </member>
  29440. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.k0">
  29441. Encrypted nonce
  29442. </member>
  29443. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.k1">
  29444. Encrypted nonce
  29445. </member>
  29446. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.k2">
  29447. Encrypted nonce
  29448. </member>
  29449. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.k3">
  29450. Encrypted nonce
  29451. </member>
  29452. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.currentBlock">
  29453. Current block of buffered input
  29454. </member>
  29455. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.currentBlockOffset">
  29456. Current offset in input buffer
  29457. </member>
  29458. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.h0">
  29459. Polynomial accumulator
  29460. </member>
  29461. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.h1">
  29462. Polynomial accumulator
  29463. </member>
  29464. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.h2">
  29465. Polynomial accumulator
  29466. </member>
  29467. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.h3">
  29468. Polynomial accumulator
  29469. </member>
  29470. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.h4">
  29471. Polynomial accumulator
  29472. </member>
  29473. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.#ctor">
  29474. Constructs a Poly1305 MAC, where the key passed to init() will be used directly.
  29475. </member>
  29476. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  29477. Constructs a Poly1305 MAC, using a 128 bit block cipher.
  29478. </member>
  29479. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastPoly1305.Init(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  29480. <summary>
  29481. Initialises the Poly1305 MAC.
  29482. </summary>
  29483. <param name="parameters">a {@link ParametersWithIV} containing a 128 bit nonce and a {@link KeyParameter} with
  29484. a 256 bit key complying to the {@link Poly1305KeyGenerator Poly1305 key format}.</param>
  29485. </member>
  29486. <member name="T:Best.HTTP.Shared.TLS.Crypto.Impl.FastSalsa20Engine">
  29487. <summary>
  29488. Implementation of Daniel J. Bernstein's Salsa20 stream cipher, Snuffle 2005
  29489. </summary>
  29490. </member>
  29491. <member name="F:Best.HTTP.Shared.TLS.Crypto.Impl.FastSalsa20Engine.StateSize">
  29492. Constants
  29493. </member>
  29494. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastSalsa20Engine.#ctor">
  29495. <summary>
  29496. Creates a 20 round Salsa20 engine.
  29497. </summary>
  29498. </member>
  29499. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastSalsa20Engine.#ctor(System.Int32)">
  29500. <summary>
  29501. Creates a Salsa20 engine with a specific number of rounds.
  29502. </summary>
  29503. <param name="rounds">the number of rounds (must be an even number).</param>
  29504. </member>
  29505. <member name="T:Best.HTTP.Shared.TLS.Crypto.Impl.FastSicBlockCipher">
  29506. Implements the Segmented Integer Counter (SIC) mode on top of a simple
  29507. block cipher.
  29508. </member>
  29509. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastSicBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  29510. Basic constructor.
  29511. @param c the block cipher to be used.
  29512. </member>
  29513. <member name="P:Best.HTTP.Shared.TLS.Crypto.Impl.FastSicBlockCipher.UnderlyingCipher">
  29514. return the underlying block cipher that we are wrapping.
  29515. @return the underlying block cipher that we are wrapping.
  29516. </member>
  29517. <member name="T:Best.HTTP.Shared.TLS.Crypto.Impl.FastTlsAeadCipher">
  29518. <summary>A generic TLS 1.2 AEAD cipher.</summary>
  29519. </member>
  29520. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastTlsAeadCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl,System.Int32,System.Int32,System.Int32)">
  29521. <exception cref="T:System.IO.IOException"/>
  29522. </member>
  29523. <member name="T:Best.HTTP.Shared.TLS.Crypto.Impl.FastTlsBlockCipher">
  29524. <summary>A generic TLS 1.0-1.2 block cipher. This can be used for AES or 3DES for example.</summary>
  29525. </member>
  29526. <member name="M:Best.HTTP.Shared.TLS.Crypto.Impl.FastTlsBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHmac,Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.TlsHmac,System.Int32)">
  29527. <exception cref="T:System.IO.IOException"/>
  29528. </member>
  29529. <member name="T:Best.HTTP.Shared.TLS.Crypto.FastCbcBlockCipher">
  29530. implements Cipher-Block-Chaining (CBC) mode on top of a simple cipher.
  29531. </member>
  29532. <member name="M:Best.HTTP.Shared.TLS.Crypto.FastCbcBlockCipher.#ctor(Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IBlockCipher)">
  29533. Basic constructor.
  29534. @param cipher the block cipher to be used as the basis of chaining.
  29535. </member>
  29536. <member name="P:Best.HTTP.Shared.TLS.Crypto.FastCbcBlockCipher.UnderlyingCipher">
  29537. return the underlying block cipher that we are wrapping.
  29538. @return the underlying block cipher that we are wrapping.
  29539. </member>
  29540. <member name="M:Best.HTTP.Shared.TLS.Crypto.FastCbcBlockCipher.Init(System.Boolean,Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.ICipherParameters)">
  29541. Initialise the cipher and, possibly, the initialisation vector (IV).
  29542. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  29543. @param forEncryption if true the cipher is initialised for
  29544. encryption, if false for decryption.
  29545. @param param the key and other data required by the cipher.
  29546. @exception ArgumentException if the parameters argument is
  29547. inappropriate.
  29548. </member>
  29549. <member name="P:Best.HTTP.Shared.TLS.Crypto.FastCbcBlockCipher.AlgorithmName">
  29550. return the algorithm name and mode.
  29551. @return the name of the underlying algorithm followed by "/CBC".
  29552. </member>
  29553. <member name="M:Best.HTTP.Shared.TLS.Crypto.FastCbcBlockCipher.GetBlockSize">
  29554. return the block size of the underlying cipher.
  29555. @return the block size of the underlying cipher.
  29556. </member>
  29557. <member name="M:Best.HTTP.Shared.TLS.Crypto.FastCbcBlockCipher.Reset">
  29558. reset the chaining vector back to the IV and reset the underlying
  29559. cipher.
  29560. </member>
  29561. <member name="T:Best.HTTP.Shared.TLS.Labels">
  29562. <summary>
  29563. https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/Key_Log_Format
  29564. </summary>
  29565. </member>
  29566. <member name="T:Best.HTTP.JSON.Json">
  29567. <summary>
  29568. Based on the download from http://techblog.procurios.nl/k/news/view/14605/14863/how-do-i-write-my-own-parser-%28for-json%29.html
  29569. This class encodes and decodes JSON strings.
  29570. Spec. details, see http://www.json.org/
  29571. JSON uses Arrays and Objects. These correspond here to the datatypes List and Dictionary.
  29572. All numbers are parsed to doubles.
  29573. </summary>
  29574. </member>
  29575. <member name="M:Best.HTTP.JSON.Json.Decode(System.String)">
  29576. <summary>
  29577. Parses the string json into a value
  29578. </summary>
  29579. <param name="json">A JSON string.</param>
  29580. <returns>A List, a Dictionary, a double, a string, null, true, or false</returns>
  29581. </member>
  29582. <member name="M:Best.HTTP.JSON.Json.Decode(System.String,System.Boolean@)">
  29583. <summary>
  29584. Parses the string json into a value; and fills 'success' with the successfullness of the parse.
  29585. </summary>
  29586. <param name="json">A JSON string.</param>
  29587. <param name="success">Successful parse?</param>
  29588. <returns>A List, a Dictionary, a double, a string, null, true, or false</returns>
  29589. </member>
  29590. <member name="M:Best.HTTP.JSON.Json.Encode(System.Object)">
  29591. <summary>
  29592. Converts a Dictionary / List object into a JSON string
  29593. </summary>
  29594. <param name="json">A Dictionary / List</param>
  29595. <returns>A JSON encoded string, or null if object 'json' is not serializable</returns>
  29596. </member>
  29597. <member name="M:Best.HTTP.JSON.LitJson.JsonData.ContainsKey(System.String)">
  29598. <summary>
  29599. Determines whether the json contains an element that has the specified key.
  29600. </summary>
  29601. <param name="key">The key to locate in the json.</param>
  29602. <returns>true if the json contains an element that has the specified key; otherwise, false.</returns>
  29603. </member>
  29604. <member name="T:Best.HTTP.Caching.HTTPCacheBuilder">
  29605. <summary>
  29606. A builder struct for constructing an instance of the HTTPCache class with optional configuration options and callbacks.
  29607. </summary>
  29608. </member>
  29609. <member name="M:Best.HTTP.Caching.HTTPCacheBuilder.WithOptions(Best.HTTP.Caching.HTTPCacheOptions)">
  29610. <summary>
  29611. Sets the configuration options for the HTTP cache.
  29612. </summary>
  29613. <param name="options">The <see cref="T:Best.HTTP.Caching.HTTPCacheOptions"/> containing cache configuration settings.</param>
  29614. <returns>The current <see cref="T:Best.HTTP.Caching.HTTPCacheBuilder"/> instance for method chaining.</returns>
  29615. </member>
  29616. <member name="M:Best.HTTP.Caching.HTTPCacheBuilder.WithOptions(Best.HTTP.Caching.HTTPCacheOptionsBuilder)">
  29617. <summary>
  29618. Sets the configuration options for the HTTP cache using an <see cref="T:Best.HTTP.Caching.HTTPCacheOptionsBuilder"/>.
  29619. </summary>
  29620. <param name="optionsBuilder">An <see cref="T:Best.HTTP.Caching.HTTPCacheOptionsBuilder"/> for building cache configuration settings.</param>
  29621. <returns>The current <see cref="T:Best.HTTP.Caching.HTTPCacheBuilder"/> instance for method chaining.</returns>
  29622. </member>
  29623. <member name="M:Best.HTTP.Caching.HTTPCacheBuilder.WithBeforeBeginCacheCallback(Best.HTTP.Caching.OnBeforeBeginCacheDelegate)">
  29624. <summary>
  29625. Sets a callback delegate to be executed before caching of an entity begins.
  29626. </summary>
  29627. <param name="callback">The delegate to be executed before caching starts.</param>
  29628. <returns>The current <see cref="T:Best.HTTP.Caching.HTTPCacheBuilder"/> instance for method chaining.</returns>
  29629. </member>
  29630. <member name="M:Best.HTTP.Caching.HTTPCacheBuilder.Build">
  29631. <summary>
  29632. Builds and returns an instance of the <see cref="T:Best.HTTP.Caching.HTTPCache"/> with the specified configuration options and callback delegate.
  29633. </summary>
  29634. <returns>An <see cref="T:Best.HTTP.Caching.HTTPCache"/> instance configured with the specified options and callback.</returns>
  29635. </member>
  29636. <member name="T:Best.HTTP.Caching.HTTPCacheOptionsBuilder">
  29637. <summary>
  29638. A builder struct for constructing an instance of <see cref="T:Best.HTTP.Caching.HTTPCacheOptions"/> with optional configuration settings.
  29639. </summary>
  29640. </member>
  29641. <member name="M:Best.HTTP.Caching.HTTPCacheOptionsBuilder.WithMaxCacheSize(System.UInt64)">
  29642. <summary>
  29643. Sets the maximum cache size for the HTTP cache.
  29644. </summary>
  29645. <param name="maxCacheSize">The maximum size, in bytes, that the cache can reach.</param>
  29646. <returns>The current <see cref="T:Best.HTTP.Caching.HTTPCacheOptionsBuilder"/> instance for method chaining.</returns>
  29647. </member>
  29648. <member name="M:Best.HTTP.Caching.HTTPCacheOptionsBuilder.WithDeleteOlderThen(System.TimeSpan)">
  29649. <summary>
  29650. Sets the maximum duration for which cached entries will be retained.
  29651. By default all entities (even stalled ones) are kept cached until they are evicted to make room for new, fresh ones.
  29652. </summary>
  29653. <param name="olderThan">The maximum age for cached entries to be retained.</param>
  29654. <returns>The current <see cref="T:Best.HTTP.Caching.HTTPCacheOptionsBuilder"/> instance for method chaining.</returns>
  29655. </member>
  29656. <member name="M:Best.HTTP.Caching.HTTPCacheOptionsBuilder.Build">
  29657. <summary>
  29658. Builds and returns an instance of <see cref="T:Best.HTTP.Caching.HTTPCacheOptions"/> with the specified configuration settings.
  29659. </summary>
  29660. <returns>An <see cref="T:Best.HTTP.Caching.HTTPCacheOptions"/> instance configured with the specified settings.</returns>
  29661. </member>
  29662. <member name="T:Best.HTTP.Caching.ErrorTypeForValidation">
  29663. <summary>
  29664. Types of errors that can occur during cache validation.
  29665. </summary>
  29666. </member>
  29667. <member name="F:Best.HTTP.Caching.ErrorTypeForValidation.None">
  29668. <summary>
  29669. Indicates that no error has occurred during validation.
  29670. </summary>
  29671. </member>
  29672. <member name="F:Best.HTTP.Caching.ErrorTypeForValidation.ServerError">
  29673. <summary>
  29674. Indicates a server error has occurred during validation.
  29675. </summary>
  29676. </member>
  29677. <member name="F:Best.HTTP.Caching.ErrorTypeForValidation.ConnectionError">
  29678. <summary>
  29679. Indicates a connection error has occurred during validation.
  29680. </summary>
  29681. </member>
  29682. <member name="T:Best.HTTP.Caching.OnBeforeBeginCacheDelegate">
  29683. <summary>
  29684. Represents a delegate that can be used to perform actions before caching of an entity begins.
  29685. </summary>
  29686. <param name="method">The HTTP method used in the request.</param>
  29687. <param name="uri">The URI of the HTTP request.</param>
  29688. <param name="statusCode">The HTTP status code of the response.</param>
  29689. <param name="headers">The HTTP response headers.</param>
  29690. <param name="context">An optional logging context for debugging.</param>
  29691. </member>
  29692. <member name="T:Best.HTTP.Caching.OnCacheSizeChangedDelegate">
  29693. <summary>
  29694. Represents a delegate that can be used to handle cache size change events.
  29695. </summary>
  29696. </member>
  29697. <member name="T:Best.HTTP.Caching.HTTPCache">
  29698. <summary>
  29699. Manages caching of HTTP responses and associated metadata.
  29700. </summary>
  29701. <remarks>
  29702. <para>The `HTTPCache` class provides a powerful caching mechanism for HTTP responses in Unity applications.
  29703. It allows you to store and retrieve HTTP responses efficiently, reducing network requests and improving
  29704. the performance of your application. By utilizing HTTP caching, you can enhance user experience, reduce
  29705. bandwidth usage, and optimize loading times.
  29706. </para>
  29707. <para>
  29708. Key features:
  29709. <list type="bullet">
  29710. <item><term>Optimal User Experience</term><description>Users experience faster load times and smoother interactions, enhancing user satisfaction.</description></item>
  29711. <item><term>Efficient Caching</term><description>It enables efficient caching of HTTP responses, reducing the need to fetch data from the network repeatedly.</description></item>
  29712. <item><term>Improved Performance</term><description>Caching helps improve the performance of your Unity application by reducing latency and decreasing loading times.</description></item>
  29713. <item><term>Bandwidth Optimization</term><description>By storing and reusing cached responses, you can minimize bandwidth usage, making your application more data-friendly.</description></item>
  29714. <item><term>Offline Access</term><description>Cached responses allow your application to function even when the device is offline or has limited connectivity.</description></item>
  29715. <item><term>Reduced Server Load</term><description>Fewer network requests mean less load on your server infrastructure, leading to cost savings and improved server performance.</description></item>
  29716. <item><term>Manual Cache Control</term><description>You can also manually control caching by adding, removing, or updating cached responses.</description></item>
  29717. </list>
  29718. </para>
  29719. </remarks>
  29720. </member>
  29721. <member name="F:Best.HTTP.Caching.HTTPCache.RootFolderName">
  29722. <summary>
  29723. Constants defining folder and file names used in the HTTP cache storage.
  29724. </summary>
  29725. </member>
  29726. <member name="F:Best.HTTP.Caching.HTTPCache.CacheHostName">
  29727. <summary>
  29728. This is the reversed domain the plugin uses for file paths when it have to load content from the local cache.
  29729. </summary>
  29730. </member>
  29731. <member name="F:Best.HTTP.Caching.HTTPCache.OnCacheSizeChanged">
  29732. <summary>
  29733. Event that is triggered when the size of the cache changes.
  29734. </summary>
  29735. </member>
  29736. <member name="P:Best.HTTP.Caching.HTTPCache.Options">
  29737. <summary>
  29738. Gets the options that define the behavior of the HTTP cache.
  29739. </summary>
  29740. </member>
  29741. <member name="P:Best.HTTP.Caching.HTTPCache.CacheSize">
  29742. <summary>
  29743. Gets the current size of the HTTP cache in bytes.
  29744. </summary>
  29745. </member>
  29746. <member name="F:Best.HTTP.Caching.HTTPCache.OnBeforeBeginCache">
  29747. <summary>
  29748. Called before the plugin calls <see cref="M:Best.HTTP.Caching.HTTPCache.BeginCache(Best.HTTP.HTTPMethods,System.Uri,System.Int32,System.Collections.Generic.Dictionary{System.String,System.Collections.Generic.List{System.String}},Best.HTTP.Shared.Logger.LoggingContext)"/> to decide whether the content will be cached or not.
  29749. </summary>
  29750. </member>
  29751. <member name="M:Best.HTTP.Caching.HTTPCache.#ctor(Best.HTTP.Caching.HTTPCacheOptions)">
  29752. <summary>
  29753. Initializes a new instance of the HTTPCache class with the specified cache options.
  29754. </summary>
  29755. <param name="options">The HTTP cache options specifying cache size and deletion policy.</param>
  29756. </member>
  29757. <member name="M:Best.HTTP.Caching.HTTPCache.CalculateHash(Best.HTTP.HTTPMethods,System.Uri)">
  29758. <summary>
  29759. Calculates a unique hash identifier based on the HTTP method and URI.
  29760. </summary>
  29761. <param name="method">The HTTP method used in the request.</param>
  29762. <param name="uri">The URI of the HTTP request.</param>
  29763. <returns>A unique hash identifier for the combination of method and URI.</returns>
  29764. </member>
  29765. <member name="M:Best.HTTP.Caching.HTTPCache.GetHashDirectory(UnityEngine.Hash128)">
  29766. <summary>
  29767. Generates the directory path based on the given hash where cached content is stored.
  29768. </summary>
  29769. <param name="hash">A unique hash identifier for the cached content, returned by <see cref="M:Best.HTTP.Caching.HTTPCache.CalculateHash(Best.HTTP.HTTPMethods,System.Uri)"/>.</param>
  29770. <returns>The directory path for the cached content associated with the given hash.</returns>
  29771. </member>
  29772. <member name="M:Best.HTTP.Caching.HTTPCache.GetHeaderPathFromHash(UnityEngine.Hash128)">
  29773. <summary>
  29774. Generates the file path for the header cache associated with the given hash.
  29775. </summary>
  29776. <param name="hash">A unique hash identifier for the cached content, returned by <see cref="M:Best.HTTP.Caching.HTTPCache.CalculateHash(Best.HTTP.HTTPMethods,System.Uri)"/>.</param>
  29777. <returns>The file path for the header cache associated with the given hash.</returns>
  29778. </member>
  29779. <member name="M:Best.HTTP.Caching.HTTPCache.GetContentPathFromHash(UnityEngine.Hash128)">
  29780. <summary>
  29781. Generates the file path for the content cache associated with the given hash.
  29782. </summary>
  29783. <param name="hash">A unique hash identifier for the cached content, returned by <see cref="M:Best.HTTP.Caching.HTTPCache.CalculateHash(Best.HTTP.HTTPMethods,System.Uri)"/>.</param>
  29784. <returns>The file path for the content cache associated with the given hash.</returns>
  29785. </member>
  29786. <member name="M:Best.HTTP.Caching.HTTPCache.AreCacheFilesExists(UnityEngine.Hash128)">
  29787. <summary>
  29788. Checks whether cache files (header and content) associated with the given hash exist.
  29789. </summary>
  29790. <param name="hash">A unique hash identifier for the cached content.</param>
  29791. <returns><c>true</c> if both header and content cache files exist, otherwise <c>false</c>.</returns>
  29792. </member>
  29793. <member name="M:Best.HTTP.Caching.HTTPCache.SetupValidationHeaders(Best.HTTP.HTTPRequest)">
  29794. <summary>
  29795. Sets up validation headers on an HTTP request if a locally cached response exists.
  29796. </summary>
  29797. <param name="request">The <see cref="T:Best.HTTP.HTTPRequest"/> to which validation headers will be added.</param>
  29798. </member>
  29799. <member name="M:Best.HTTP.Caching.HTTPCache.IsThereEnoughSpaceAfterMaintain(System.UInt64,Best.HTTP.Shared.Logger.LoggingContext)">
  29800. <summary>
  29801. If necessary tries to make enough space in the cache by calling Maintain.
  29802. </summary>
  29803. </member>
  29804. <member name="M:Best.HTTP.Caching.HTTPCache.BeginCache(Best.HTTP.HTTPMethods,System.Uri,System.Int32,System.Collections.Generic.Dictionary{System.String,System.Collections.Generic.List{System.String}},Best.HTTP.Shared.Logger.LoggingContext)">
  29805. <summary>
  29806. Initiates the caching process for an HTTP response, creating an <see cref="T:Best.HTTP.Caching.HTTPCacheContentWriter"/> if caching is enabled and all predconditions are met.
  29807. </summary>
  29808. <param name="method">The <see cref="T:Best.HTTP.HTTPRequest"/> method used to fetch the response.</param>
  29809. <param name="uri">The URI for the response.</param>
  29810. <param name="statusCode">The HTTP status code of the response.</param>
  29811. <param name="headers">The HTTP headers of the response.</param>
  29812. <param name="context">An optional logging context for debugging.</param>
  29813. <returns>An <see cref="T:Best.HTTP.Caching.HTTPCacheContentWriter"/> instance for writing the response content to the cache, or null if caching is not enabled or not possible.</returns>
  29814. </member>
  29815. <member name="M:Best.HTTP.Caching.HTTPCache.EndCache(Best.HTTP.Caching.HTTPCacheContentWriter,System.Boolean,Best.HTTP.Shared.Logger.LoggingContext)">
  29816. <summary>
  29817. Finalizes the caching process and takes appropriate actions based on the completion status.
  29818. </summary>
  29819. <param name="cacheResult">The <see cref="T:Best.HTTP.Caching.HTTPCacheContentWriter"/> instance representing the caching operation.</param>
  29820. <param name="completedWithoutIssue">A boolean indicating whether the caching process completed without issues.</param>
  29821. <param name="context">An optional logging context for debugging.</param>
  29822. </member>
  29823. <member name="M:Best.HTTP.Caching.HTTPCache.BeginReadContent(UnityEngine.Hash128,Best.HTTP.Shared.Logger.LoggingContext)">
  29824. <summary>
  29825. Initiates the process of reading cached content associated with a given hash. Call BeginReadContent to acquire a Stream object that points to the cached resource.
  29826. </summary>
  29827. <param name="hash">A hash from <see cref="M:Best.HTTP.Caching.HTTPCache.CalculateHash(Best.HTTP.HTTPMethods,System.Uri)"/> identifying the resource.</param>
  29828. <param name="context">An optional <see cref="T:Best.HTTP.Shared.Logger.LoggingContext"/></param>
  29829. <returns>A stream for reading the cached content, or null if the content could not be read (the resource isn't cached or currently downloading).</returns>
  29830. </member>
  29831. <member name="M:Best.HTTP.Caching.HTTPCache.EndReadContent(UnityEngine.Hash128,Best.HTTP.Shared.Logger.LoggingContext)">
  29832. <summary>
  29833. Finalizes the process of reading cached content associated with a given hash.
  29834. </summary>
  29835. <param name="hash">The unique hash identifier for the cached content.</param>
  29836. <param name="context">An optional logging context for debugging.</param>
  29837. </member>
  29838. <member name="M:Best.HTTP.Caching.HTTPCache.Delete(UnityEngine.Hash128,Best.HTTP.Shared.Logger.LoggingContext)">
  29839. <summary>
  29840. Deletes a cached entry identified by the given hash, including its associated header and content files.
  29841. </summary>
  29842. <param name="hash">The unique hash identifier for the cached entry to be deleted.</param>
  29843. <param name="context">An optional logging context for debugging.</param>
  29844. </member>
  29845. <member name="M:Best.HTTP.Caching.HTTPCache.RefreshHeaders(UnityEngine.Hash128,System.Collections.Generic.Dictionary{System.String,System.Collections.Generic.List{System.String}},Best.HTTP.Shared.Logger.LoggingContext)">
  29846. <summary>
  29847. Refreshes the headers of a cached HTTP response with new headers.
  29848. </summary>
  29849. <param name="hash">A unique hash identifier for the cached response from a <see cref="M:Best.HTTP.Caching.HTTPCache.CalculateHash(Best.HTTP.HTTPMethods,System.Uri)"/> call.</param>
  29850. <param name="newHeaders">A dictionary of new headers to replace or merge with existing headers.</param>
  29851. <param name="context">Used by the plugin to add an addition logging context for debugging. It can be <c>null</c>.</param>
  29852. <returns><c>true</c> if the headers were successfully refreshed; otherwise, <c>false</c>.</returns>
  29853. </member>
  29854. <member name="M:Best.HTTP.Caching.HTTPCache.CanServeWithoutValidation(UnityEngine.Hash128,Best.HTTP.Caching.ErrorTypeForValidation,Best.HTTP.Shared.Logger.LoggingContext)">
  29855. <summary>
  29856. Checks whether the caches resource identified by the hash is can be served from the local store with the given error conditions.
  29857. </summary>
  29858. <remarks>This check reflects the very current state, even if it returns <c>true</c>, a request might just executing to get a write lock on it to refresh the content.</remarks>
  29859. <param name="hash"><see cref="T:UnityEngine.Hash128"/> hash returned by <see cref="M:Best.HTTP.Caching.HTTPCache.CalculateHash(Best.HTTP.HTTPMethods,System.Uri)"/> identifying a resource.</param>
  29860. <param name="errorType">Possible error condition that can occur during validation. Servers can provision that certain stalled resources can be served if revalidation fails.</param>
  29861. <param name="context">Used by the plugin to add an addition logging context for debugging. It can be <c>null</c>.</param>
  29862. <returns><c>true</c> if the cached response can be served without validating it with the origin server; otherwise, <c>false</c></returns>
  29863. </member>
  29864. <member name="M:Best.HTTP.Caching.HTTPCache.Redirect(Best.HTTP.HTTPRequest,UnityEngine.Hash128)">
  29865. <summary>
  29866. Redirects a request to a cached entity.
  29867. </summary>
  29868. <param name="request">The <see cref="T:Best.HTTP.HTTPRequest"/> that will be redirected.</param>
  29869. <param name="hash">Hash obtained from <see cref="M:Best.HTTP.Caching.HTTPCache.CalculateHash(Best.HTTP.HTTPMethods,System.Uri)"/>.</param>
  29870. </member>
  29871. <member name="M:Best.HTTP.Caching.HTTPCache.Clear">
  29872. <summary>
  29873. Clears the HTTP cache by removing all cached entries and associated metadata.
  29874. </summary>
  29875. </member>
  29876. <member name="T:Best.HTTP.Caching.HTTPCacheContentWriter">
  29877. <summary>
  29878. Represents a writer for caching HTTP response content.
  29879. </summary>
  29880. </member>
  29881. <member name="P:Best.HTTP.Caching.HTTPCacheContentWriter.Cache">
  29882. <summary>
  29883. Gets the parent HTTPCache instance associated with this content writer.
  29884. </summary>
  29885. </member>
  29886. <member name="P:Best.HTTP.Caching.HTTPCacheContentWriter.Hash">
  29887. <summary>
  29888. Hash identifying the resource. If <see cref="M:Best.HTTP.Caching.HTTPCacheContentWriter.Write(Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment)"/> fails, it becomes an invalid one.
  29889. </summary>
  29890. </member>
  29891. <member name="P:Best.HTTP.Caching.HTTPCacheContentWriter.ExpectedLength">
  29892. <summary>
  29893. Expected length of the content. Has a non-zero value only when the server is sending a "content-length" header.
  29894. </summary>
  29895. </member>
  29896. <member name="P:Best.HTTP.Caching.HTTPCacheContentWriter.ProcessedLength">
  29897. <summary>
  29898. Number of bytes written to the cache.
  29899. </summary>
  29900. </member>
  29901. <member name="P:Best.HTTP.Caching.HTTPCacheContentWriter.Context">
  29902. <summary>
  29903. Context of this cache writer used for logging.
  29904. </summary>
  29905. </member>
  29906. <member name="F:Best.HTTP.Caching.HTTPCacheContentWriter._contentStream">
  29907. <summary>
  29908. Underlying stream the download bytes are written into.
  29909. </summary>
  29910. </member>
  29911. <member name="M:Best.HTTP.Caching.HTTPCacheContentWriter.Write(Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment)">
  29912. <summary>
  29913. Writes content to the underlying stream.
  29914. </summary>
  29915. <param name="segment"><see cref="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment"/> holding a reference to the data and containing information about the offset and count of the valid range of data.</param>
  29916. </member>
  29917. <member name="M:Best.HTTP.Caching.HTTPCacheContentWriter.Close">
  29918. <summary>
  29919. Close the underlying stream and invalidate the hash.
  29920. </summary>
  29921. </member>
  29922. <member name="T:Best.HTTP.Caching.LockTypes">
  29923. <summary>
  29924. Possible lock-states a cache-content can be in.
  29925. </summary>
  29926. </member>
  29927. <member name="F:Best.HTTP.Caching.LockTypes.Unlocked">
  29928. <summary>
  29929. No reads or writes are happening on the cached content.
  29930. </summary>
  29931. </member>
  29932. <member name="F:Best.HTTP.Caching.LockTypes.Write">
  29933. <summary>
  29934. There's one writer operating on the cached content. No other writes or reads allowed while this lock is held on the content.
  29935. </summary>
  29936. </member>
  29937. <member name="F:Best.HTTP.Caching.LockTypes.Read">
  29938. <summary>
  29939. There's at least one read operation happening on the cached content. No writes allowed while this lock is held on the content.
  29940. </summary>
  29941. </member>
  29942. <member name="T:Best.HTTP.Caching.CacheMetadata">
  29943. <summary>
  29944. Metadata stored for every cached content. It contains only limited data about the content to help early cache decision making and cache management.
  29945. </summary>
  29946. </member>
  29947. <member name="P:Best.HTTP.Caching.CacheMetadata.Hash">
  29948. <summary>
  29949. Unique hash of the cached content, generated by <see cref="M:Best.HTTP.Caching.HTTPCache.CalculateHash(Best.HTTP.HTTPMethods,System.Uri)"/>.
  29950. </summary>
  29951. </member>
  29952. <member name="P:Best.HTTP.Caching.CacheMetadata.ContentLength">
  29953. <summary>
  29954. Size of the stored content in bytes.
  29955. </summary>
  29956. </member>
  29957. <member name="P:Best.HTTP.Caching.CacheMetadata.LastAccessTime">
  29958. <summary>
  29959. When the last time the content is accessed. Also initialized when the initial download completes.
  29960. </summary>
  29961. </member>
  29962. <member name="P:Best.HTTP.Caching.CacheMetadata.Lock">
  29963. <summary>
  29964. What kind of lock the content is currently in.
  29965. </summary>
  29966. </member>
  29967. <member name="P:Best.HTTP.Caching.CacheMetadata.ReadLockCount">
  29968. <summary>
  29969. Number of readers.
  29970. </summary>
  29971. </member>
  29972. <member name="T:Best.HTTP.Caching.CacheFlags">
  29973. <summary>
  29974. Possible caching flags that a `Cache-Control` header can send.
  29975. </summary>
  29976. </member>
  29977. <member name="F:Best.HTTP.Caching.CacheFlags.None">
  29978. <summary>
  29979. No special treatment required.
  29980. </summary>
  29981. </member>
  29982. <member name="F:Best.HTTP.Caching.CacheFlags.MustRevalidate">
  29983. <summary>
  29984. Indicates whether the entity must be revalidated with the server or can be serverd directly from the cache without touching the server when the content is considered stale.
  29985. </summary>
  29986. <remarks>
  29987. More details can be found here:
  29988. <list type="bullet">
  29989. <item><description><see href="https://www.rfc-editor.org/rfc/rfc9111.html#name-must-revalidate"/></description></item>
  29990. </list>
  29991. </remarks>
  29992. </member>
  29993. <member name="F:Best.HTTP.Caching.CacheFlags.NoCache">
  29994. <summary>
  29995. If it's true, the client always have to revalidate the cached content when it's stale.
  29996. </summary>
  29997. <remarks>
  29998. More details can be found here:
  29999. <list type="bullet">
  30000. <item><description><see href="https://www.rfc-editor.org/rfc/rfc9111.html#name-no-cache-2"/></description></item>
  30001. </list>
  30002. </remarks>
  30003. </member>
  30004. <member name="T:Best.HTTP.Caching.CacheMetadataContent">
  30005. <summary>
  30006. Cached content associated with a <see cref="T:Best.HTTP.Caching.CacheMetadata"/>.
  30007. </summary>
  30008. <remarks>This is NOT the cached content received from the server! It's for storing caching values to decide on how the content can be used.</remarks>
  30009. </member>
  30010. <member name="F:Best.HTTP.Caching.CacheMetadataContent.ETag">
  30011. <summary>
  30012. ETag of the entity.
  30013. </summary>
  30014. <remarks>
  30015. More details can be found here:
  30016. <list type="bullet">
  30017. <item><description><see href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/ETag"/></description></item>
  30018. </list>
  30019. </remarks>
  30020. </member>
  30021. <member name="F:Best.HTTP.Caching.CacheMetadataContent.LastModified">
  30022. <summary>
  30023. LastModified date of the entity. Use ToString("r") to convert it to the format defined in RFC 1123.
  30024. </summary>
  30025. </member>
  30026. <member name="F:Best.HTTP.Caching.CacheMetadataContent.Expires">
  30027. <summary>
  30028. When the cache will expire.
  30029. </summary>
  30030. <remarks>
  30031. More details can be found here:
  30032. <list type="bullet">
  30033. <item><description><see href="https://www.rfc-editor.org/rfc/rfc9111.html#name-expires"/></description></item>
  30034. </list>
  30035. </remarks>
  30036. </member>
  30037. <member name="F:Best.HTTP.Caching.CacheMetadataContent.Age">
  30038. <summary>
  30039. The age that came with the response
  30040. </summary>
  30041. <remarks>
  30042. More details can be found here:
  30043. <list type="bullet">
  30044. <item><description><see href="https://www.rfc-editor.org/rfc/rfc9111.html#name-age"/></description></item>
  30045. </list>
  30046. </remarks>
  30047. </member>
  30048. <member name="F:Best.HTTP.Caching.CacheMetadataContent.MaxAge">
  30049. <summary>
  30050. Maximum how long the entry should served from the cache without revalidation.
  30051. </summary>
  30052. <remarks>
  30053. More details can be found here:
  30054. <list type="bullet">
  30055. <item><description><see href="https://www.rfc-editor.org/rfc/rfc9111.html#name-max-age-2"/></description></item>
  30056. </list>
  30057. </remarks>
  30058. </member>
  30059. <member name="F:Best.HTTP.Caching.CacheMetadataContent.Date">
  30060. <summary>
  30061. The Date that came with the response.
  30062. </summary>
  30063. <remarks>
  30064. More details can be found here:
  30065. <list type="bullet">
  30066. <item><description><see href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Date"/></description></item>
  30067. </list>
  30068. </remarks>
  30069. </member>
  30070. <member name="F:Best.HTTP.Caching.CacheMetadataContent.StaleWhileRevalidate">
  30071. <summary>
  30072. It's a grace period to serve staled content without revalidation.
  30073. </summary>
  30074. <remarks>
  30075. More details can be found here:
  30076. <list type="bullet">
  30077. <item><description><see href="https://www.rfc-editor.org/rfc/rfc5861.html#section-3"/></description></item>
  30078. </list>
  30079. </remarks>
  30080. </member>
  30081. <member name="F:Best.HTTP.Caching.CacheMetadataContent.StaleIfError">
  30082. <summary>
  30083. Allows the client to serve stale content if the server responds with an 5xx error.
  30084. </summary>
  30085. <remarks>
  30086. More details can be found here:
  30087. <list type="bullet">
  30088. <item><description><see href="https://www.rfc-editor.org/rfc/rfc5861.html#section-4"/></description></item>
  30089. </list>
  30090. </remarks>
  30091. </member>
  30092. <member name="F:Best.HTTP.Caching.CacheMetadataContent.Flags">
  30093. <summary>
  30094. bool values packed into one single flag.
  30095. </summary>
  30096. </member>
  30097. <member name="F:Best.HTTP.Caching.CacheMetadataContent.RequestTime">
  30098. <summary>
  30099. The value of the clock at the time of the request that resulted in the stored response.
  30100. </summary>
  30101. <remarks>
  30102. More details can be found here:
  30103. <list type="bullet">
  30104. <item><description><see href="https://www.rfc-editor.org/rfc/rfc9111.html#section-4.2.3-3.8"/></description></item>
  30105. </list>
  30106. </remarks>
  30107. </member>
  30108. <member name="F:Best.HTTP.Caching.CacheMetadataContent.ResponseTime">
  30109. <summary>
  30110. The value of the clock at the time the response was received.
  30111. </summary>
  30112. </member>
  30113. <member name="T:Best.HTTP.Caching.HTTPCacheOptions">
  30114. <summary>
  30115. Represents the configuration options for the HTTP cache.
  30116. </summary>
  30117. </member>
  30118. <member name="P:Best.HTTP.Caching.HTTPCacheOptions.DeleteOlder">
  30119. <summary>
  30120. Gets or sets the maximum duration for which cached entries will be retained.
  30121. </summary>
  30122. </member>
  30123. <member name="P:Best.HTTP.Caching.HTTPCacheOptions.MaxCacheSize">
  30124. <summary>
  30125. Gets or sets the maximum size, in bytes, that the cache can reach.
  30126. </summary>
  30127. </member>
  30128. <member name="M:Best.HTTP.Caching.HTTPCacheOptions.#ctor">
  30129. <summary>
  30130. Initializes a new instance of the <see cref="T:Best.HTTP.Caching.HTTPCacheOptions"/> class with default settings.
  30131. </summary>
  30132. </member>
  30133. <member name="M:Best.HTTP.Caching.HTTPCacheOptions.#ctor(System.TimeSpan,System.UInt64)">
  30134. <summary>
  30135. Initializes a new instance of the <see cref="T:Best.HTTP.Caching.HTTPCacheOptions"/> class with custom settings.
  30136. </summary>
  30137. <param name="deleteOlder">The maximum age for cached entries to be retained.</param>
  30138. <param name="maxCacheSize">The maximum size, in bytes, that the cache can reach.</param>
  30139. </member>
  30140. <member name="T:Best.HTTP.Cookies.Cookie">
  30141. <summary>
  30142. The Cookie implementation based on <see href="http://tools.ietf.org/html/rfc6265">RFC-6265</see>.
  30143. </summary>
  30144. </member>
  30145. <member name="P:Best.HTTP.Cookies.Cookie.Name">
  30146. <summary>
  30147. The name of the cookie.
  30148. </summary>
  30149. </member>
  30150. <member name="P:Best.HTTP.Cookies.Cookie.Value">
  30151. <summary>
  30152. The value of the cookie.
  30153. </summary>
  30154. </member>
  30155. <member name="P:Best.HTTP.Cookies.Cookie.Date">
  30156. <summary>
  30157. The Date when the Cookie is registered.
  30158. </summary>
  30159. </member>
  30160. <member name="P:Best.HTTP.Cookies.Cookie.LastAccess">
  30161. <summary>
  30162. When this Cookie last used in a request.
  30163. </summary>
  30164. </member>
  30165. <member name="P:Best.HTTP.Cookies.Cookie.Expires">
  30166. <summary>
  30167. The Expires attribute indicates the maximum lifetime of the cookie, represented as the date and time at which the cookie expires.
  30168. The user agent is not required to retain the cookie until the specified date has passed.
  30169. In fact, user agents often evict cookies due to memory pressure or privacy concerns.
  30170. </summary>
  30171. </member>
  30172. <member name="P:Best.HTTP.Cookies.Cookie.MaxAge">
  30173. <summary>
  30174. The Max-Age attribute indicates the maximum lifetime of the cookie, represented as the number of seconds until the cookie expires.
  30175. The user agent is not required to retain the cookie for the specified duration.
  30176. In fact, user agents often evict cookies due to memory pressure or privacy concerns.
  30177. </summary>
  30178. </member>
  30179. <member name="P:Best.HTTP.Cookies.Cookie.IsSession">
  30180. <summary>
  30181. If a cookie has neither the Max-Age nor the Expires attribute, the user agent will retain the cookie until "the current session is over".
  30182. </summary>
  30183. </member>
  30184. <member name="P:Best.HTTP.Cookies.Cookie.Domain">
  30185. <summary>
  30186. The Domain attribute specifies those hosts to which the cookie will be sent.
  30187. For example, if the value of the Domain attribute is "example.com", the user agent will include the cookie
  30188. in the Cookie header when making HTTP requests to example.com, www.example.com, and www.corp.example.com.
  30189. If the server omits the Domain attribute, the user agent will return the cookie only to the origin server.
  30190. </summary>
  30191. </member>
  30192. <member name="P:Best.HTTP.Cookies.Cookie.Path">
  30193. <summary>
  30194. The scope of each cookie is limited to a set of paths, controlled by the Path attribute.
  30195. If the server omits the Path attribute, the user agent will use the "directory" of the request-uri's path component as the default value.
  30196. </summary>
  30197. </member>
  30198. <member name="P:Best.HTTP.Cookies.Cookie.IsSecure">
  30199. <summary>
  30200. The Secure attribute limits the scope of the cookie to "secure" channels (where "secure" is defined by the user agent).
  30201. When a cookie has the Secure attribute, the user agent will include the cookie in an HTTP request only if the request is
  30202. transmitted over a secure channel (typically HTTP over Transport Layer Security (TLS)).
  30203. </summary>
  30204. </member>
  30205. <member name="P:Best.HTTP.Cookies.Cookie.IsHttpOnly">
  30206. <summary>
  30207. The HttpOnly attribute limits the scope of the cookie to HTTP requests.
  30208. In particular, the attribute instructs the user agent to omit the cookie when providing access to
  30209. cookies via "non-HTTP" APIs (such as a web browser API that exposes cookies to scripts).
  30210. </summary>
  30211. </member>
  30212. <member name="P:Best.HTTP.Cookies.Cookie.SameSite">
  30213. <summary>
  30214. SameSite prevents the browser from sending this cookie along with cross-site requests.
  30215. The main goal is mitigate the risk of cross-origin information leakage.
  30216. It also provides some protection against cross-site request forgery attacks.
  30217. Possible values for the flag are lax or strict.
  30218. </summary>
  30219. <remarks>
  30220. More details can be found here:
  30221. <list type="bullet">
  30222. <item><description><see href="https://web.dev/samesite-cookies-explained/">SameSite cookies explained</see></description></item>
  30223. </list>
  30224. </remarks>
  30225. </member>
  30226. <member name="M:Best.HTTP.Cookies.Cookie.GuessSize">
  30227. <summary>
  30228. Guess the storage size of the cookie.
  30229. </summary>
  30230. <returns></returns>
  30231. </member>
  30232. <member name="T:Best.HTTP.Cookies.CookieJar">
  30233. <summary>
  30234. The Cookie Jar implementation based on <see href="http://tools.ietf.org/html/rfc6265">RFC 6265</see>.
  30235. </summary>
  30236. </member>
  30237. <member name="P:Best.HTTP.Cookies.CookieJar.MaximumSize">
  30238. <summary>
  30239. Maximum size of the Cookie Jar in bytes. It's default value is 10485760 (10 MB).
  30240. </summary>
  30241. </member>
  30242. <member name="P:Best.HTTP.Cookies.CookieJar.IsSavingSupported">
  30243. <summary>
  30244. Returns true if File apis are supported.
  30245. </summary>
  30246. </member>
  30247. <member name="F:Best.HTTP.Cookies.CookieJar.AccessThreshold">
  30248. <summary>
  30249. The plugin will delete cookies that are accessed this threshold ago. Its default value is 7 days.
  30250. </summary>
  30251. </member>
  30252. <member name="F:Best.HTTP.Cookies.CookieJar.IsSessionOverride">
  30253. <summary>
  30254. If this property is set to <c>true</c>, then new cookies treated as session cookies and these cookies are not saved to disk. Its default value is <c>false</c>.
  30255. </summary>
  30256. </member>
  30257. <member name="F:Best.HTTP.Cookies.CookieJar.IsEnabled">
  30258. <summary>
  30259. Enabled or disables storing and handling of cookies. If set to false, <see cref="T:Best.HTTP.HTTPRequest">HTTPRequests</see> aren't searched for cookies and no cookies will be set for <see cref="T:Best.HTTP.HTTPResponse"/>s.
  30260. </summary>
  30261. </member>
  30262. <member name="F:Best.HTTP.Cookies.CookieJar.Cookies">
  30263. <summary>
  30264. List of the Cookies
  30265. </summary>
  30266. </member>
  30267. <member name="F:Best.HTTP.Cookies.CookieJar.rwLock">
  30268. <summary>
  30269. Synchronization object for thread safety.
  30270. </summary>
  30271. </member>
  30272. <member name="M:Best.HTTP.Cookies.CookieJar.SetFromRequest(Best.HTTP.HTTPResponse)">
  30273. <summary>
  30274. Will set or update all cookies from the response object.
  30275. </summary>
  30276. </member>
  30277. <member name="M:Best.HTTP.Cookies.CookieJar.Maintain(System.Boolean)">
  30278. <summary>
  30279. Deletes all expired or 'old' cookies, and will keep the sum size of cookies under the given size.
  30280. </summary>
  30281. </member>
  30282. <member name="M:Best.HTTP.Cookies.CookieJar.Persist">
  30283. <summary>
  30284. Saves the Cookie Jar to a file.
  30285. </summary>
  30286. <remarks>Not implemented under Unity WebPlayer</remarks>
  30287. </member>
  30288. <member name="M:Best.HTTP.Cookies.CookieJar.Load">
  30289. <summary>
  30290. Load previously persisted cookie library from the file.
  30291. </summary>
  30292. </member>
  30293. <member name="M:Best.HTTP.Cookies.CookieJar.Get(System.Uri)">
  30294. <summary>
  30295. Returns all Cookies that corresponds to the given Uri.
  30296. </summary>
  30297. </member>
  30298. <member name="M:Best.HTTP.Cookies.CookieJar.Set(System.Uri,Best.HTTP.Cookies.Cookie)">
  30299. <summary>
  30300. Will add a new, or overwrite an old cookie if already exists.
  30301. </summary>
  30302. </member>
  30303. <member name="M:Best.HTTP.Cookies.CookieJar.Set(Best.HTTP.Cookies.Cookie)">
  30304. <summary>
  30305. Will add a new, or overwrite an old cookie if already exists.
  30306. </summary>
  30307. </member>
  30308. <member name="M:Best.HTTP.Cookies.CookieJar.Clear">
  30309. <summary>
  30310. Deletes all cookies from the Jar.
  30311. </summary>
  30312. </member>
  30313. <member name="M:Best.HTTP.Cookies.CookieJar.Clear(System.TimeSpan)">
  30314. <summary>
  30315. Removes cookies that older than the given parameter.
  30316. </summary>
  30317. </member>
  30318. <member name="M:Best.HTTP.Cookies.CookieJar.Clear(System.String)">
  30319. <summary>
  30320. Removes cookies that matches to the given domain.
  30321. </summary>
  30322. </member>
  30323. <member name="M:Best.HTTP.Cookies.CookieJar.Find(Best.HTTP.Cookies.Cookie,System.Int32@)">
  30324. <summary>
  30325. Find and return a Cookie and his index in the list.
  30326. </summary>
  30327. </member>
  30328. <member name="T:Best.HTTP.Hosts.Connections.ConnectionBase">
  30329. <summary>
  30330. Abstract base class for concrete connection implementation (HTTP/1, HTTP/2, WebGL, File).
  30331. </summary>
  30332. </member>
  30333. <member name="P:Best.HTTP.Hosts.Connections.ConnectionBase.HostKey">
  30334. <summary>
  30335. The address of the server that this connection is bound to.
  30336. </summary>
  30337. </member>
  30338. <member name="P:Best.HTTP.Hosts.Connections.ConnectionBase.State">
  30339. <summary>
  30340. The state of this connection.
  30341. </summary>
  30342. </member>
  30343. <member name="P:Best.HTTP.Hosts.Connections.ConnectionBase.CurrentRequest">
  30344. <summary>
  30345. If the State is HTTPConnectionStates.Processing, then it holds a HTTPRequest instance. Otherwise it's null.
  30346. </summary>
  30347. </member>
  30348. <member name="P:Best.HTTP.Hosts.Connections.ConnectionBase.KeepAliveTime">
  30349. <summary>
  30350. How much the connection kept alive after its last request processing.
  30351. </summary>
  30352. </member>
  30353. <member name="P:Best.HTTP.Hosts.Connections.ConnectionBase.AssignedRequests">
  30354. <summary>
  30355. Number of assigned requests to process.
  30356. </summary>
  30357. </member>
  30358. <member name="P:Best.HTTP.Hosts.Connections.ConnectionBase.MaxAssignedRequests">
  30359. <summary>
  30360. Maximum number of assignable requests.
  30361. </summary>
  30362. </member>
  30363. <member name="P:Best.HTTP.Hosts.Connections.ConnectionBase.StartTime">
  30364. <summary>
  30365. When we start to process the current request. It's set after the connection is established.
  30366. </summary>
  30367. </member>
  30368. <member name="M:Best.HTTP.Hosts.Connections.ConnectionBase.Shutdown(Best.HTTP.Shared.ShutdownTypes)">
  30369. <summary>
  30370. Called when the plugin shuts down immediately.
  30371. </summary>
  30372. </member>
  30373. <member name="T:Best.HTTP.Hosts.Connections.KeepAliveHeader">
  30374. <summary>
  30375. https://tools.ietf.org/html/draft-thomson-hybi-http-timeout-03
  30376. Test servers: http://tools.ietf.org/ http://nginx.org/
  30377. </summary>
  30378. </member>
  30379. <member name="P:Best.HTTP.Hosts.Connections.KeepAliveHeader.TimeOut">
  30380. <summary>
  30381. A host sets the value of the "timeout" parameter to the time that the host will allow an idle connection to remain open before it is closed. A connection is idle if no data is sent or received by a host.
  30382. </summary>
  30383. </member>
  30384. <member name="P:Best.HTTP.Hosts.Connections.KeepAliveHeader.MaxRequests">
  30385. <summary>
  30386. The "max" parameter has been used to indicate the maximum number of requests that would be made on the connection.This parameter is deprecated.Any limit on requests can be enforced by sending "Connection: close" and closing the connection.
  30387. </summary>
  30388. </member>
  30389. <member name="T:Best.HTTP.Hosts.Connections.ConnectionHelper">
  30390. <summary>
  30391. Static helper class to handle cases where the plugin has to do additional logic based on the received response. These are like connection management, handling redirections, loading from local cache, authentication challanges, etc.
  30392. </summary>
  30393. </member>
  30394. <member name="M:Best.HTTP.Hosts.Connections.ConnectionHelper.HandleResponse(Best.HTTP.HTTPRequest,System.Boolean@,Best.HTTP.Hosts.Connections.HTTPConnectionStates@,Best.HTTP.Hosts.Connections.KeepAliveHeader@,Best.HTTP.Shared.Logger.LoggingContext)">
  30395. <summary>
  30396. Called when the whole response received
  30397. </summary>
  30398. </member>
  30399. <member name="P:Best.HTTP.Hosts.Connections.HTTP1.HTTP1ContentConsumer.AssignedRequests">
  30400. <summary>
  30401. Number of assigned requests to process.
  30402. </summary>
  30403. </member>
  30404. <member name="P:Best.HTTP.Hosts.Connections.HTTP1.HTTP1ContentConsumer.MaxAssignedRequests">
  30405. <summary>
  30406. Maximum number of assignable requests
  30407. </summary>
  30408. </member>
  30409. <member name="T:Best.HTTP.Hosts.Connections.HTTP1.PeekableHTTP1Response">
  30410. <summary>
  30411. An HTTP 1.1 response implementation that can utilize a peekable stream.
  30412. Its main entry point is the ProcessPeekable method that should be called after every chunk of data downloaded.
  30413. </summary>
  30414. </member>
  30415. <member name="T:Best.HTTP.Hosts.Connections.HTTP2.WebSocketOverHTTP2Settings">
  30416. <summary>
  30417. Settings for HTTP/2 connections when the Connect protocol is available.
  30418. </summary>
  30419. </member>
  30420. <member name="P:Best.HTTP.Hosts.Connections.HTTP2.WebSocketOverHTTP2Settings.EnableWebSocketOverHTTP2">
  30421. <summary>
  30422. Set it to false to disable Websocket Over HTTP/2 (RFC 8441). It's true by default.
  30423. </summary>
  30424. </member>
  30425. <member name="P:Best.HTTP.Hosts.Connections.HTTP2.WebSocketOverHTTP2Settings.EnableImplementationFallback">
  30426. <summary>
  30427. Set it to disable fallback logic from the Websocket Over HTTP/2 implementation to the 'old' HTTP/1 implementation when it fails to connect.
  30428. </summary>
  30429. </member>
  30430. <member name="T:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings">
  30431. <summary>
  30432. Settings for HTTP/2 connections.
  30433. </summary>
  30434. </member>
  30435. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.EnableHTTP2Connections">
  30436. <summary>
  30437. When set to false, the plugin will not try to use HTTP/2 connections.
  30438. </summary>
  30439. </member>
  30440. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.HeaderTableSize">
  30441. <summary>
  30442. Maximum size of the HPACK header table.
  30443. </summary>
  30444. </member>
  30445. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.MaxConcurrentStreams">
  30446. <summary>
  30447. Maximum concurrent http2 stream on http2 connection will allow. Its default value is 128;
  30448. </summary>
  30449. </member>
  30450. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.InitialStreamWindowSize">
  30451. <summary>
  30452. Initial window size of a http2 stream. Its default value is 65535, can be controlled through the HTTPRequest's DownloadSettings object.
  30453. </summary>
  30454. </member>
  30455. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.InitialConnectionWindowSize">
  30456. <summary>
  30457. Global window size of a http/2 connection. Its default value is the maximum possible value on 31 bits.
  30458. </summary>
  30459. </member>
  30460. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.MaxFrameSize">
  30461. <summary>
  30462. Maximum size of a http2 frame.
  30463. </summary>
  30464. </member>
  30465. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.MaxHeaderListSize">
  30466. <summary>
  30467. Not used.
  30468. </summary>
  30469. </member>
  30470. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.MaxIdleTime">
  30471. <summary>
  30472. With HTTP/2 only one connection will be open so we can keep it open longer as we hope it will be reused more.
  30473. </summary>
  30474. </member>
  30475. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.PingFrequency">
  30476. <summary>
  30477. Time between two ping messages.
  30478. </summary>
  30479. </member>
  30480. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.Timeout">
  30481. <summary>
  30482. Timeout to receive a ping acknowledgement from the server. If no ack reveived in this time the connection will be treated as broken.
  30483. </summary>
  30484. </member>
  30485. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.EnableConnectProtocol">
  30486. <summary>
  30487. Set to true to enable RFC 8441 "Bootstrapping WebSockets with HTTP/2" (https://tools.ietf.org/html/rfc8441).
  30488. </summary>
  30489. </member>
  30490. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings.WebSocketOverHTTP2Settings">
  30491. <summary>
  30492. Settings for WebSockets over HTTP/2 (RFC 8441)
  30493. </summary>
  30494. </member>
  30495. <member name="T:Best.HTTP.Hosts.Connections.HTTP2.HTTP2AltSVCFrame">
  30496. <summary>
  30497. https://tools.ietf.org/html/rfc7838#section-4
  30498. </summary>
  30499. </member>
  30500. <member name="T:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings">
  30501. <summary>
  30502. <see href="https://httpwg.org/specs/rfc7540.html#iana-settings">Settings Registry</see>
  30503. </summary>
  30504. </member>
  30505. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings.HEADER_TABLE_SIZE">
  30506. <summary>
  30507. Allows the sender to inform the remote endpoint of the maximum size of the
  30508. header compression table used to decode header blocks, in octets.
  30509. The encoder can select any size equal to or less than this value
  30510. by using signaling specific to the header compression format inside a header block (see [COMPRESSION]).
  30511. The initial value is 4,096 octets.
  30512. </summary>
  30513. </member>
  30514. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings.ENABLE_PUSH">
  30515. <summary>
  30516. This setting can be used to disable server push (Section 8.2).
  30517. An endpoint MUST NOT send a PUSH_PROMISE frame if it receives this parameter set to a value of 0.
  30518. An endpoint that has both set this parameter to 0 and had it acknowledged MUST treat the receipt of a
  30519. PUSH_PROMISE frame as a connection error (Section 5.4.1) of type PROTOCOL_ERROR.
  30520. The initial value is 1, which indicates that server push is permitted.
  30521. Any value other than 0 or 1 MUST be treated as a connection error (Section 5.4.1) of type PROTOCOL_ERROR.
  30522. </summary>
  30523. </member>
  30524. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings.MAX_CONCURRENT_STREAMS">
  30525. <summary>
  30526. Indicates the maximum number of concurrent streams that the sender will allow. This limit is directional:
  30527. it applies to the number of streams that the sender permits the receiver to create.
  30528. Initially, there is no limit to this value. It is recommended that this value be no smaller than 100,
  30529. so as to not unnecessarily limit parallelism.
  30530. A value of 0 for SETTINGS_MAX_CONCURRENT_STREAMS SHOULD NOT be treated as special by endpoints.
  30531. A zero value does prevent the creation of new streams;
  30532. however, this can also happen for any limit that is exhausted with active streams.
  30533. Servers SHOULD only set a zero value for short durations; if a server does not wish to accept requests,
  30534. closing the connection is more appropriate.
  30535. </summary>
  30536. </member>
  30537. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings.INITIAL_WINDOW_SIZE">
  30538. <summary>
  30539. Indicates the sender's initial window size (in octets) for stream-level flow control.
  30540. The initial value is 2^16-1 (65,535) octets.
  30541. This setting affects the window size of all streams (see Section 6.9.2).
  30542. Values above the maximum flow-control window size of 2^31-1 MUST be treated as a connection error
  30543. (Section 5.4.1) of type FLOW_CONTROL_ERROR.
  30544. </summary>
  30545. </member>
  30546. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings.MAX_FRAME_SIZE">
  30547. <summary>
  30548. Indicates the size of the largest frame payload that the sender is willing to receive, in octets.
  30549. The initial value is 2^14 (16,384) octets.
  30550. The value advertised by an endpoint MUST be between this initial value and the maximum allowed frame size
  30551. (2^24-1 or 16,777,215 octets), inclusive.
  30552. Values outside this range MUST be treated as a connection error (Section 5.4.1) of type PROTOCOL_ERROR.
  30553. </summary>
  30554. </member>
  30555. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings.MAX_HEADER_LIST_SIZE">
  30556. <summary>
  30557. This advisory setting informs a peer of the maximum size of header list that the sender is prepared to accept, in octets.
  30558. The value is based on the uncompressed size of header fields,
  30559. including the length of the name and value in octets plus an overhead of 32 octets for each header field.
  30560. For any given request, a lower limit than what is advertised MAY be enforced. The initial value of this setting is unlimited.
  30561. </summary>
  30562. </member>
  30563. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings.ENABLE_CONNECT_PROTOCOL">
  30564. <summary>
  30565. https://tools.ietf.org/html/rfc8441
  30566. Upon receipt of SETTINGS_ENABLE_CONNECT_PROTOCOL with a value of 1, a client MAY use the Extended CONNECT as defined in this document when creating new streams.
  30567. Receipt of this parameter by a server does not have any impact.
  30568. A sender MUST NOT send a SETTINGS_ENABLE_CONNECT_PROTOCOL parameter with the value of 0 after previously sending a value of 1.
  30569. </summary>
  30570. </member>
  30571. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings.NO_RFC7540_PRIORITIES">
  30572. <summary>
  30573. Allow endpoints to omit or ignore HTTP/2 priority signals.
  30574. <see href="https://www.rfc-editor.org/rfc/rfc9218.html">Extensible Prioritization Scheme for HTTP</see>
  30575. </summary>
  30576. </member>
  30577. <member name="T:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsRegistry">
  30578. <summary>
  30579. Represents a registry for HTTP/2 settings.
  30580. </summary>
  30581. </member>
  30582. <member name="P:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsRegistry.IsReadOnly">
  30583. <summary>
  30584. Gets a value indicating whether the registry is read-only.
  30585. </summary>
  30586. </member>
  30587. <member name="F:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsRegistry.OnSettingChangedEvent">
  30588. <summary>
  30589. Event triggered when a setting changes.
  30590. </summary>
  30591. </member>
  30592. <member name="P:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsRegistry.Item(Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings)">
  30593. <summary>
  30594. Indexer to get or set values based on an <see cref="T:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings"/> key.
  30595. </summary>
  30596. <param name="setting">The setting key.</param>
  30597. <returns>The value associated with the given setting key.</returns>
  30598. </member>
  30599. <member name="P:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsRegistry.IsChanged">
  30600. <summary>
  30601. Gets a value indicating whether any setting has changed.
  30602. </summary>
  30603. </member>
  30604. <member name="M:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsRegistry.#ctor(Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsManager,System.Boolean,System.Boolean)">
  30605. <summary>
  30606. Initializes a new instance of the HTTP2SettingsRegistry class.
  30607. </summary>
  30608. <param name="parent">The parent <see cref="T:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsManager"/>.</param>
  30609. <param name="readOnly">Whether this registry is read-only.</param>
  30610. <param name="treatItAsAlreadyChanged">Whether to treat the registry as if a setting has already changed.</param>
  30611. </member>
  30612. <member name="M:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsRegistry.Merge(System.Collections.Generic.List{System.Collections.Generic.KeyValuePair{Best.HTTP.Hosts.Connections.HTTP2.HTTP2Settings,System.UInt32}})">
  30613. <summary>
  30614. Merges the specified settings into the current registry.
  30615. </summary>
  30616. <param name="settings">The settings to merge.</param>
  30617. </member>
  30618. <member name="M:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsRegistry.Merge(Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsRegistry)">
  30619. <summary>
  30620. Merges settings from another HTTP2SettingsRegistry into the current registry.
  30621. </summary>
  30622. <param name="from">The registry to merge settings from.</param>
  30623. </member>
  30624. <member name="M:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsRegistry.CreateFrame(Best.HTTP.Shared.Logger.LoggingContext)">
  30625. <summary>
  30626. Creates a new HTTP/2 frame based on the current registry settings.
  30627. </summary>
  30628. <param name="context">The logging context.</param>
  30629. <returns>A new HTTP/2 frame.</returns>
  30630. </member>
  30631. <member name="T:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsManager">
  30632. <summary>
  30633. Class to manager local and remote HTTP/2 settings.
  30634. </summary>
  30635. </member>
  30636. <member name="P:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsManager.MySettings">
  30637. <summary>
  30638. This is the ACKd or default settings that we sent to the server.
  30639. </summary>
  30640. </member>
  30641. <member name="P:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsManager.InitiatedMySettings">
  30642. <summary>
  30643. This is the setting that can be changed. It will be sent to the server ASAP, and when ACKd, it will be copied
  30644. to MySettings.
  30645. </summary>
  30646. </member>
  30647. <member name="P:Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsManager.RemoteSettings">
  30648. <summary>
  30649. Settings of the remote peer
  30650. </summary>
  30651. </member>
  30652. <member name="T:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Stream">
  30653. <summary>
  30654. Implements an HTTP/2 logical stream.
  30655. </summary>
  30656. </member>
  30657. <member name="P:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Stream.HasFrameToSend">
  30658. <summary>
  30659. This flag is checked by the connection to decide whether to do a new processing-frame sending round before sleeping until new data arrives
  30660. </summary>
  30661. </member>
  30662. <member name="P:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Stream.NextInteraction">
  30663. <summary>
  30664. Next interaction scheduled by the stream relative to *now*. Its default is TimeSpan.MaxValue == no interaction.
  30665. </summary>
  30666. </member>
  30667. <member name="M:Best.HTTP.Hosts.Connections.HTTP2.HTTP2Stream.#ctor(System.UInt32,Best.HTTP.Hosts.Connections.HTTP2.HTTP2ContentConsumer,Best.HTTP.Hosts.Connections.HTTP2.HTTP2SettingsManager,Best.HTTP.Hosts.Connections.HTTP2.HPACKEncoder)">
  30668. <summary>
  30669. Constructor to create a client stream.
  30670. </summary>
  30671. </member>
  30672. <member name="T:Best.HTTP.Hosts.Connections.HTTP2.HuffmanTableEntry">
  30673. <summary>
  30674. A pre-generated table entry in a Huffman-Tree.
  30675. </summary>
  30676. </member>
  30677. <member name="M:Best.HTTP.Hosts.Connections.HTTP2.HuffmanTableEntry.GetBitAtIdx(System.Byte)">
  30678. <summary>
  30679. It must return 0 or 1 at bit index. Indexing will be relative to the Bits representing the current code. Idx grows from left to right. Idx must be between [1..Bits].
  30680. </summary>
  30681. </member>
  30682. <member name="T:Best.HTTP.Hosts.Connections.HTTPConnectionStates">
  30683. <summary>
  30684. Possible states of a Http Connection.
  30685. The ideal lifecycle of a connection that has KeepAlive is the following: Initial => [Processing => WaitForRecycle => Free] => Closed.
  30686. </summary>
  30687. </member>
  30688. <member name="F:Best.HTTP.Hosts.Connections.HTTPConnectionStates.Initial">
  30689. <summary>
  30690. This Connection instance is just created.
  30691. </summary>
  30692. </member>
  30693. <member name="F:Best.HTTP.Hosts.Connections.HTTPConnectionStates.Processing">
  30694. <summary>
  30695. This Connection is processing a request
  30696. </summary>
  30697. </member>
  30698. <member name="F:Best.HTTP.Hosts.Connections.HTTPConnectionStates.WaitForProtocolShutdown">
  30699. <summary>
  30700. Wait for the upgraded protocol to shut down.
  30701. </summary>
  30702. </member>
  30703. <member name="F:Best.HTTP.Hosts.Connections.HTTPConnectionStates.Recycle">
  30704. <summary>
  30705. The Connection is finished processing the request, it's waiting now to deliver it's result.
  30706. </summary>
  30707. </member>
  30708. <member name="F:Best.HTTP.Hosts.Connections.HTTPConnectionStates.Free">
  30709. <summary>
  30710. The request result's delivered, it's now up to processing again.
  30711. </summary>
  30712. </member>
  30713. <member name="F:Best.HTTP.Hosts.Connections.HTTPConnectionStates.Closed">
  30714. <summary>
  30715. If it's not a KeepAlive connection, or something happened, then we close this connection and remove from the pool.
  30716. </summary>
  30717. </member>
  30718. <member name="F:Best.HTTP.Hosts.Connections.HTTPConnectionStates.ClosedResendRequest">
  30719. <summary>
  30720. Same as the Closed state, but processing this request requires resending the last processed request too.
  30721. </summary>
  30722. </member>
  30723. <member name="T:Best.HTTP.Hosts.Connections.HTTPOverTCPConnection">
  30724. <summary>
  30725. Represents and manages a connection to a server.
  30726. </summary>
  30727. </member>
  30728. <member name="P:Best.HTTP.Hosts.Connections.HTTPOverTCPConnection.AssignedRequests">
  30729. <summary>
  30730. Number of assigned requests to process.
  30731. </summary>
  30732. </member>
  30733. <member name="P:Best.HTTP.Hosts.Connections.HTTPOverTCPConnection.MaxAssignedRequests">
  30734. <summary>
  30735. Maximum number of assignable requests.
  30736. </summary>
  30737. </member>
  30738. <member name="M:Best.HTTP.Hosts.Connections.HTTPOverTCPConnection.TrySetErrorState(Best.HTTP.HTTPRequest,System.Exception)">
  30739. <summary>
  30740. Returns true if an error state is set to the request and the connection is closing.
  30741. </summary>
  30742. </member>
  30743. <member name="T:Best.HTTP.Hosts.Connections.IDownloadContentBufferAvailable">
  30744. <summary>
  30745. Defines an interface for notifying connections when space becomes available in a buffer for downloading data.
  30746. Connections implementating of this interface are used to signal their internal logic that they can transfer data into the available buffer space.
  30747. </summary>
  30748. </member>
  30749. <member name="M:Best.HTTP.Hosts.Connections.IDownloadContentBufferAvailable.BufferAvailable(Best.HTTP.Response.DownloadContentStream)">
  30750. <summary>
  30751. Notifies a connection that space has become available in the buffer for downloading data.
  30752. When invoked, this method indicates to a connection that it can transfer additional data into the buffer for further processing.
  30753. </summary>
  30754. <param name="stream">The <see cref="T:Best.HTTP.Response.DownloadContentStream"/> instance associated with the buffer.</param>
  30755. </member>
  30756. <member name="T:Best.HTTP.Hosts.Connections.IHTTPRequestHandler">
  30757. <summary>
  30758. Common interface for implementations that will coordinate request processing inside a connection.
  30759. </summary>
  30760. </member>
  30761. <member name="P:Best.HTTP.Hosts.Connections.IHTTPRequestHandler.AssignedRequests">
  30762. <summary>
  30763. Number of assigned requests to process.
  30764. </summary>
  30765. </member>
  30766. <member name="P:Best.HTTP.Hosts.Connections.IHTTPRequestHandler.MaxAssignedRequests">
  30767. <summary>
  30768. Maximum number of assignable requests.
  30769. </summary>
  30770. </member>
  30771. <member name="M:Best.HTTP.Hosts.Connections.IHTTPRequestHandler.Shutdown(Best.HTTP.Shared.ShutdownTypes)">
  30772. <summary>
  30773. An immediate shutdown request that called only on application closure.
  30774. </summary>
  30775. </member>
  30776. <member name="T:Best.HTTP.Hosts.Connections.IThreadSignaler">
  30777. <summary>
  30778. Interface for signaling upload threads.
  30779. </summary>
  30780. </member>
  30781. <member name="P:Best.HTTP.Hosts.Connections.IThreadSignaler.Context">
  30782. <summary>
  30783. A <see cref="T:Best.HTTP.Shared.Logger.LoggingContext"/> instance for debugging purposes.
  30784. </summary>
  30785. <remarks>
  30786. To help <see cref="T:Best.HTTP.Request.Upload.UploadStreamBase"/> implementors log in the IThreadSignaler's context,
  30787. the interface implementors must make their logging context accessible.
  30788. </remarks>
  30789. </member>
  30790. <member name="M:Best.HTTP.Hosts.Connections.IThreadSignaler.SignalThread">
  30791. <summary>
  30792. Signals the associated thread to resume or wake up.
  30793. </summary>
  30794. </member>
  30795. <member name="T:Best.HTTP.Hosts.Settings.AsteriskStringComparer">
  30796. <summary>
  30797. Moves any added asterisk(*) to the end of the list.
  30798. </summary>
  30799. </member>
  30800. <member name="T:Best.HTTP.Hosts.Settings.TlsClientFactoryDelegate">
  30801. <summary>
  30802. Delegate for creating a TLS 1.3 client instance.
  30803. </summary>
  30804. <param name="uri">The URI of the request.</param>
  30805. <param name="protocols">A list of supported TLS ALPN protocols.</param>
  30806. <param name="context">The logging context for the operation.</param>
  30807. <returns>A TLS 1.3 client instance.</returns>
  30808. </member>
  30809. <member name="T:Best.HTTP.Hosts.Settings.HTTRequestSettings">
  30810. <summary>
  30811. Settings for HTTP requests.
  30812. </summary>
  30813. </member>
  30814. <member name="F:Best.HTTP.Hosts.Settings.HTTRequestSettings.ConnectTimeout">
  30815. <summary>
  30816. The timeout for establishing a connection.
  30817. </summary>
  30818. </member>
  30819. <member name="F:Best.HTTP.Hosts.Settings.HTTRequestSettings.RequestTimeout">
  30820. <summary>
  30821. The maximum time allowed for the request to complete.
  30822. </summary>
  30823. </member>
  30824. <member name="T:Best.HTTP.Hosts.Settings.HTTP1ConnectionSettings">
  30825. <summary>
  30826. Settings for HTTP/1 connections.
  30827. </summary>
  30828. </member>
  30829. <member name="F:Best.HTTP.Hosts.Settings.HTTP1ConnectionSettings.TryToReuseConnections">
  30830. <summary>
  30831. Indicates whether the connection should be open after receiving the response.
  30832. </summary>
  30833. <remarks>
  30834. If set to <c>true</c>, internal TCP connections will be reused whenever possible.
  30835. If making rare requests to the server, it's recommended to change this to <c>false</c>.
  30836. </remarks>
  30837. </member>
  30838. <member name="F:Best.HTTP.Hosts.Settings.HTTP1ConnectionSettings.MaxConnectionIdleTime">
  30839. <summary>
  30840. The maximum time a connection can remain idle before being closed.
  30841. </summary>
  30842. </member>
  30843. <member name="F:Best.HTTP.Hosts.Settings.HTTP1ConnectionSettings.ForceUseThreadPool">
  30844. <summary>
  30845. Indicates whether the upload thread should use a <see href="https://learn.microsoft.com/en-us/dotnet/api/system.threading.threadpool">ThreadPool</see> thread instead of creating and using a <see href="https://learn.microsoft.com/en-us/dotnet/api/system.threading.thread">Thread</see>.
  30846. </summary>
  30847. <remarks>The plugin tries to use ThreadPool threads for known short-living uploads like requests without upload body. With <c>ForceUseThreadPool</c> all HTTP/1 requests, including long uploads or downloads can be forced to use ThreadPool threads.</remarks>
  30848. </member>
  30849. <member name="T:Best.HTTP.Hosts.Settings.ClientCertificateSelector">
  30850. <summary>
  30851. Delegate for selecting a client certificate.
  30852. </summary>
  30853. <param name="targetHost">The target host.</param>
  30854. <param name="localCertificates">A collection of local certificates.</param>
  30855. <param name="remoteCertificate">The remote certificate.</param>
  30856. <param name="acceptableIssuers">An array of acceptable certificate issuers.</param>
  30857. <returns>The selected X.509 certificate.</returns>
  30858. </member>
  30859. <member name="T:Best.HTTP.Hosts.Settings.TLSHandlers">
  30860. <summary>
  30861. Available TLS handlers.
  30862. </summary>
  30863. </member>
  30864. <member name="F:Best.HTTP.Hosts.Settings.TLSHandlers.BouncyCastle">
  30865. <summary>
  30866. To use the 3rd party BouncyCastle implementation.
  30867. </summary>
  30868. </member>
  30869. <member name="F:Best.HTTP.Hosts.Settings.TLSHandlers.Framework">
  30870. <summary>
  30871. To use .net's SslStream.
  30872. </summary>
  30873. </member>
  30874. <member name="T:Best.HTTP.Hosts.Settings.BouncyCastleSettings">
  30875. <summary>
  30876. Settings for Bouncy Castle TLS.
  30877. </summary>
  30878. </member>
  30879. <member name="F:Best.HTTP.Hosts.Settings.BouncyCastleSettings.TlsClientFactory">
  30880. <summary>
  30881. Delegate for creating a TLS 1.3 client instance using Bouncy Castle.
  30882. </summary>
  30883. </member>
  30884. <member name="M:Best.HTTP.Hosts.Settings.BouncyCastleSettings.DefaultTlsClientFactory(System.Uri,System.Collections.Generic.List{Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ProtocolName},Best.HTTP.Shared.Logger.LoggingContext)">
  30885. <summary>
  30886. The default TLS 1.3 client factory.
  30887. </summary>
  30888. <param name="uri">The URI of the request.</param>
  30889. <param name="protocols">A list of supported TLS ALPN protocols.</param>
  30890. <param name="context">The logging context for the operation.</param>
  30891. <returns>A TLS 1.3 client instance.</returns>
  30892. </member>
  30893. <member name="T:Best.HTTP.Hosts.Settings.FrameworkTLSSettings">
  30894. <summary>
  30895. Settings for .NET's SslStream based handler.
  30896. </summary>
  30897. </member>
  30898. <member name="F:Best.HTTP.Hosts.Settings.FrameworkTLSSettings.TlsVersions">
  30899. <summary>
  30900. The supported TLS versions.
  30901. </summary>
  30902. </member>
  30903. <member name="F:Best.HTTP.Hosts.Settings.FrameworkTLSSettings.CheckCertificateRevocation">
  30904. <summary>
  30905. Indicates whether to check certificate revocation.
  30906. </summary>
  30907. </member>
  30908. <member name="F:Best.HTTP.Hosts.Settings.FrameworkTLSSettings.DefaultCertificationValidator">
  30909. <summary>
  30910. The default certification validator.
  30911. </summary>
  30912. </member>
  30913. <member name="F:Best.HTTP.Hosts.Settings.FrameworkTLSSettings.ClientCertificationProvider">
  30914. <summary>
  30915. Delegate for providing a client certificate.
  30916. </summary>
  30917. </member>
  30918. <member name="T:Best.HTTP.Hosts.Settings.TLSSettings">
  30919. <summary>
  30920. Settings for TLS.
  30921. </summary>
  30922. </member>
  30923. <member name="F:Best.HTTP.Hosts.Settings.TLSSettings.TLSHandler">
  30924. <summary>
  30925. The selected TLS handler.
  30926. </summary>
  30927. </member>
  30928. <member name="F:Best.HTTP.Hosts.Settings.TLSSettings.BouncyCastleSettings">
  30929. <summary>
  30930. Settings for Bouncy Castle.
  30931. </summary>
  30932. </member>
  30933. <member name="F:Best.HTTP.Hosts.Settings.TLSSettings.FrameworkTLSSettings">
  30934. <summary>
  30935. .NET's SslStream settings.
  30936. </summary>
  30937. </member>
  30938. <member name="T:Best.HTTP.Hosts.Settings.HostVariantSettings">
  30939. <summary>
  30940. Settings for <see cref="T:Best.HTTP.HostSetting.HostVariant"/>s.
  30941. </summary>
  30942. </member>
  30943. <member name="F:Best.HTTP.Hosts.Settings.HostVariantSettings.MaxConnectionPerVariant">
  30944. <summary>
  30945. The maximum number of connections allowed per host variant.
  30946. </summary>
  30947. </member>
  30948. <member name="F:Best.HTTP.Hosts.Settings.HostVariantSettings.MaxAssignedRequestsFactor">
  30949. <summary>
  30950. Factor used when calculations are made whether to open a new connection to the server or not.
  30951. </summary>
  30952. <remarks>
  30953. It has an effect on HTTP/2 connections only.
  30954. <para>Higher values (gte <c>1.0f</c>) delay, lower values (lte <c>1.0f</c>) bring forward creation of new connections.</para>
  30955. </remarks>
  30956. </member>
  30957. <member name="F:Best.HTTP.Hosts.Settings.HostVariantSettings.VariantFactory">
  30958. <summary>
  30959. Factory function to generate HostVariant or descendent instances.
  30960. </summary>
  30961. </member>
  30962. <member name="F:Best.HTTP.Hosts.Settings.HostVariantSettings.ConnectionFactory">
  30963. <summary>
  30964. Factory function to generate custom connection implementations.
  30965. </summary>
  30966. </member>
  30967. <member name="T:Best.HTTP.Hosts.Settings.LowLevelConnectionSettings">
  30968. <summary>
  30969. Represents the low-level TCP buffer settings for connections.
  30970. </summary>
  30971. </member>
  30972. <member name="F:Best.HTTP.Hosts.Settings.LowLevelConnectionSettings.TCPWriteBufferSize">
  30973. <summary>
  30974. Gets or sets the size of the TCP write buffer in bytes.
  30975. </summary>
  30976. <remarks>
  30977. <para>Default value is 1 MiB.</para>
  30978. <para>This determines the maximum amount of data that that the <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> class can buffer up if it's already in a write operation.
  30979. Increasing this value can potentially improve write performance, especially for large messages or data streams.
  30980. However, setting it too high might consume a significant amount of memory, especially if there are many active connections.
  30981. </para>
  30982. </remarks>
  30983. <value>The size of the TCP write buffer in bytes.</value>
  30984. </member>
  30985. <member name="F:Best.HTTP.Hosts.Settings.LowLevelConnectionSettings.ReadBufferSize">
  30986. <summary>
  30987. Gets or sets the size of the read buffer in bytes.
  30988. </summary>
  30989. <value>The size of the read buffer in bytes.</value>
  30990. <remarks>
  30991. <para>Default value is 1 MiB.</para>
  30992. <para>This determines the maximum amount of data that low level streams and the <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.TCPStreamer"/> can buffer up for consuming by higher level layers.
  30993. Adjusting this value can affect the read performance of the application.
  30994. Like the write buffer, setting this too high might be memory-intensive, especially with many connections.
  30995. It's advised to find a balance that suits the application's needs and resources.
  30996. </para>
  30997. </remarks>
  30998. </member>
  30999. <member name="T:Best.HTTP.Hosts.Settings.HostSettings">
  31000. <summary>
  31001. Contains settings that can be associated with a specific host or host variant.
  31002. </summary>
  31003. </member>
  31004. <member name="F:Best.HTTP.Hosts.Settings.HostSettings.LowLevelConnectionSettings">
  31005. <summary>
  31006. Gets or sets the low-level TCP buffer settings for connections associated with the host or host variant.
  31007. </summary>
  31008. <value>The low-level TCP buffer settings.</value>
  31009. <remarks>
  31010. These settings determine the buffer sizes for reading from and writing to TCP connections,
  31011. which can impact performance and memory usage.
  31012. </remarks>
  31013. </member>
  31014. <member name="F:Best.HTTP.Hosts.Settings.HostSettings.RequestSettings">
  31015. <summary>
  31016. Settings related to HTTP requests made to this host or host variant.
  31017. </summary>
  31018. </member>
  31019. <member name="F:Best.HTTP.Hosts.Settings.HostSettings.HTTP1ConnectionSettings">
  31020. <summary>
  31021. Settings related to HTTP/1.x connection behavior.
  31022. </summary>
  31023. </member>
  31024. <member name="F:Best.HTTP.Hosts.Settings.HostSettings.TCPRingmasterSettings">
  31025. <summary>
  31026. Settings related to TCP Ringmaster used in non-webgl platforms.
  31027. </summary>
  31028. </member>
  31029. <member name="F:Best.HTTP.Hosts.Settings.HostSettings.HTTP2ConnectionSettings">
  31030. <summary>
  31031. Settings related to HTTP/2 connection behavior.
  31032. </summary>
  31033. </member>
  31034. <member name="F:Best.HTTP.Hosts.Settings.HostSettings.TLSSettings">
  31035. <summary>
  31036. Settings related to TLS (Transport Layer Security) behavior.
  31037. </summary>
  31038. </member>
  31039. <member name="F:Best.HTTP.Hosts.Settings.HostSettings.HostVariantSettings">
  31040. <summary>
  31041. Settings related to <see cref="T:Best.HTTP.HostSetting.HostVariant"/> behavior.
  31042. </summary>
  31043. </member>
  31044. <member name="T:Best.HTTP.Hosts.Settings.HostSettingsManager">
  31045. Host Settings Hierarchy for the following hosts, settings are stored as leafs:
  31046. *.com
  31047. *.example.com
  31048. example.com
  31049. '*' matches one or more subdomains so *.example.com
  31050. - matches a.example.com and a.b.example.com
  31051. - but doesn't match example.com!
  31052. [com] [localhost] [org] [*]
  31053. +------+------+ | | |
  31054. | | [setting] [*] [setting]
  31055. [example] [*] |
  31056. / \ | [setting]
  31057. [b] [setting] [setting]
  31058. |
  31059. [a]
  31060. |
  31061. [setting]
  31062. <summary>
  31063. Manages host-specific settings for HTTP requests based on hostnames.
  31064. The HostSettingsManager is a powerful tool for fine-tuning HTTP request and connection behaviors
  31065. on a per-host basis. It enables you to define custom settings for specific hostnames
  31066. while maintaining default settings for all other hosts. This level of granularity allows you to
  31067. optimize and customize HTTP requests for different endpoints within your application.
  31068. </summary>
  31069. <remarks>
  31070. When host-specific settings are not found for a given host variant, the default <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/>
  31071. associated with the "*" host will be returned.
  31072. </remarks>
  31073. </member>
  31074. <member name="M:Best.HTTP.Hosts.Settings.HostSettingsManager.#ctor">
  31075. <summary>
  31076. Initializes a new instance of the <see cref="T:Best.HTTP.Hosts.Settings.HostSettingsManager"/> class with default settings for all hosts ("*").
  31077. </summary>
  31078. </member>
  31079. <member name="M:Best.HTTP.Hosts.Settings.HostSettingsManager.AddDefault(System.Uri)">
  31080. <summary>
  31081. Adds default settings for the host part of the specified URI. This is equivalent to calling <see cref="M:Best.HTTP.Hosts.Settings.HostSettingsManager.Add(System.Uri,Best.HTTP.Hosts.Settings.HostSettings)"/> with the a new <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/>.
  31082. </summary>
  31083. <param name="uri">The URI for which default settings should be applied. Only the host part of the URI will be used.</param>
  31084. <returns>A <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/> instance with default values.</returns>
  31085. </member>
  31086. <member name="M:Best.HTTP.Hosts.Settings.HostSettingsManager.AddDefault(System.String)">
  31087. <summary>
  31088. Adds default settings for the the specified host name. This is equivalent to calling <see cref="M:Best.HTTP.Hosts.Settings.HostSettingsManager.Add(System.String,Best.HTTP.Hosts.Settings.HostSettings)"/> with the a new <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/>.
  31089. </summary>
  31090. <param name="hostname">The hostname for which default settings should be applied.</param>
  31091. <returns>A <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/> instance with default values.</returns>
  31092. </member>
  31093. <member name="M:Best.HTTP.Hosts.Settings.HostSettingsManager.Add(System.Uri,Best.HTTP.Hosts.Settings.HostSettings)">
  31094. <summary>
  31095. Adds host-specific settings for the host part of the specified URI.
  31096. </summary>
  31097. <param name="uri">The URI for which settings should be applied. Only the host part of the URI will be used.</param>
  31098. <param name="settings">The <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/> to apply.</param>
  31099. </member>
  31100. <member name="M:Best.HTTP.Hosts.Settings.HostSettingsManager.Add(System.String,Best.HTTP.Hosts.Settings.HostSettings)">
  31101. <summary>
  31102. Adds host-specific settings for the specified hostname.
  31103. </summary>
  31104. <param name="hostname">The hostname for which settings should be applied.</param>
  31105. <param name="settings">The <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/> to apply.</param>
  31106. <exception cref="T:System.ArgumentNullException">Thrown when either the hostname or settings is null.</exception>
  31107. <exception cref="T:System.FormatException">Thrown when the hostname contains more than one asterisk ('*').</exception>
  31108. </member>
  31109. <member name="M:Best.HTTP.Hosts.Settings.HostSettingsManager.Get(Best.HTTP.HostSetting.HostVariant,System.Boolean)">
  31110. <summary>
  31111. Gets <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/> for the host part of the specified <see cref="T:Best.HTTP.HostSetting.HostVariant"/>. Returns the default settings associated with "*" when not found.
  31112. </summary>
  31113. <param name="variant">The <see cref="T:Best.HTTP.HostSetting.HostVariant"/> for which settings should be retrieved. Only the host part of the variant will be used.</param>
  31114. <returns>The host settings for the specified host variant or the default settings for "*" if not found.</returns>
  31115. </member>
  31116. <member name="M:Best.HTTP.Hosts.Settings.HostSettingsManager.Get(Best.HTTP.HostSetting.HostKey,System.Boolean)">
  31117. <summary>
  31118. Gets <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/> for the host part of the specified <see cref="T:Best.HTTP.HostSetting.HostKey"/>. Returns the default settings associated with "*" when not found.
  31119. </summary>
  31120. <param name="hostKey">The <see cref="T:Best.HTTP.HostSetting.HostKey"/> for which settings should be retrieved. Only the host part of the host key will be used.</param>
  31121. <returns>The host settings for the specified host key or the default settings for "*" if not found.</returns>
  31122. </member>
  31123. <member name="M:Best.HTTP.Hosts.Settings.HostSettingsManager.Get(System.Uri,System.Boolean)">
  31124. <summary>
  31125. Gets <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/> for the host part of the specified <see cref="T:System.Uri"/>. Returns the default settings associated with "*" when not found.
  31126. </summary>
  31127. <param name="uri">The <see cref="T:System.Uri"/> for which settings should be retrieved. Only the host part of the URI will be used.</param>
  31128. <returns>The host settings for the specified URI or the default settings for "*" if not found.</returns>
  31129. </member>
  31130. <member name="M:Best.HTTP.Hosts.Settings.HostSettingsManager.Get(System.String,System.Boolean)">
  31131. <summary>
  31132. Gets <see cref="T:Best.HTTP.Hosts.Settings.HostSettings"/> for the host part of the specified hostname. Returns the default settings associated with "*" when not found.
  31133. </summary>
  31134. <param name="hostname">The hostname for which settings should be retrieved. Only the host part of the hostname will be used.</param>
  31135. <returns>The host settings for the specified hostname or the default settings for "*" if not found.</returns>
  31136. <exception cref="T:System.ArgumentNullException">Thrown when the hostname is null.</exception>
  31137. </member>
  31138. <member name="M:Best.HTTP.Hosts.Settings.HostSettingsManager.Clear">
  31139. <summary>
  31140. Clears all host-specific settings and resetting the default ("*") with default values.
  31141. </summary>
  31142. </member>
  31143. <member name="T:Best.HTTP.HostSetting.HostKey">
  31144. <summary>
  31145. The <see cref="T:Best.HTTP.HostSetting.HostKey"/> struct represents a unique key for identifying hosts based on their <see cref="T:System.Uri"/> and <see cref="T:Best.HTTP.Request.Settings.ProxySettings"/>.
  31146. </summary>
  31147. <remarks>
  31148. <para>
  31149. The <see cref="T:Best.HTTP.HostSetting.HostKey"/> struct is designed to uniquely identify a host based on its URI (Uniform Resource Identifier) and optional proxy settings.
  31150. It provides a way to create, compare, and hash host keys, enabling efficient host variant management in the <see cref="T:Best.HTTP.HostSetting.HostManager"/>.
  31151. </para>
  31152. <para>
  31153. Key features of the <see cref="T:Best.HTTP.HostSetting.HostKey"/> struct include:
  31154. </para>
  31155. <list type="bullet">
  31156. <item>
  31157. <term>Uniqueness</term>
  31158. <description>
  31159. Each <see cref="T:Best.HTTP.HostSetting.HostKey"/> is guaranteed to be unique for a specific host, considering both the URI and proxy settings.
  31160. </description>
  31161. </item>
  31162. <item>
  31163. <term>Hashing</term>
  31164. <description>
  31165. The struct provides a method to calculate a hash code for a <see cref="T:Best.HTTP.HostSetting.HostKey"/>, making it suitable for use as a dictionary key.
  31166. </description>
  31167. </item>
  31168. <item>
  31169. <term>Creation</term>
  31170. <description>
  31171. You can create a <see cref="T:Best.HTTP.HostSetting.HostKey"/> instance from a <see cref="T:System.Uri"/> and optional <see cref="T:Best.HTTP.Request.Settings.ProxySettings"/>.
  31172. </description>
  31173. </item>
  31174. </list>
  31175. <para>
  31176. Usage of the <see cref="T:Best.HTTP.HostSetting.HostKey"/> struct is typically handled internally by the BestHTTP library to manage unique hosts and optimize resource usage.
  31177. Developers can use it when dealing with host-specific operations or customization of the library's behavior.
  31178. </para>
  31179. </remarks>
  31180. </member>
  31181. <member name="F:Best.HTTP.HostSetting.HostKey.Uri">
  31182. <summary>
  31183. Gets the URI (Uniform Resource Identifier) associated with the host.
  31184. </summary>
  31185. </member>
  31186. <member name="F:Best.HTTP.HostSetting.HostKey.Proxy">
  31187. <summary>
  31188. Gets the proxy settings associated with the host.
  31189. </summary>
  31190. </member>
  31191. <member name="F:Best.HTTP.HostSetting.HostKey.Key">
  31192. <summary>
  31193. Gets the unique hash key for the host.
  31194. </summary>
  31195. </member>
  31196. <member name="P:Best.HTTP.HostSetting.HostKey.Host">
  31197. <summary>
  31198. Gets the host name from the URI or "file" if the URI is a file URI.
  31199. </summary>
  31200. </member>
  31201. <member name="M:Best.HTTP.HostSetting.HostKey.#ctor(System.Uri,Best.HTTP.Request.Settings.ProxySettings)">
  31202. <summary>
  31203. Initializes a new instance of the <see cref="T:Best.HTTP.HostSetting.HostKey"/> struct with the specified URI and proxy settings.
  31204. </summary>
  31205. <param name="uri">The URI of the host.</param>
  31206. <param name="proxy">The proxy settings associated with the host, or <c>null</c> if no proxy is used.</param>
  31207. </member>
  31208. <member name="M:Best.HTTP.HostSetting.HostKey.From(Best.HTTP.HTTPRequest)">
  31209. <summary>
  31210. Creates a <see cref="T:Best.HTTP.HostSetting.HostKey"/> instance from an HTTP request.
  31211. </summary>
  31212. <param name="request">The HTTP request from which to extract the current URI and proxy settings.</param>
  31213. <returns>A <see cref="T:Best.HTTP.HostSetting.HostKey"/> representing the host of the HTTP request.</returns>
  31214. </member>
  31215. <member name="M:Best.HTTP.HostSetting.HostKey.From(System.Uri,Best.HTTP.Request.Settings.ProxySettings)">
  31216. <summary>
  31217. Creates a <see cref="T:Best.HTTP.HostSetting.HostKey"/> instance from a URI and proxy settings.
  31218. </summary>
  31219. <param name="uri">The URI of the host.</param>
  31220. <param name="proxy">The proxy settings associated with the host, or <c>null</c> if no proxy is used.</param>
  31221. <returns>A <see cref="T:Best.HTTP.HostSetting.HostKey"/> representing the host with the given URI and proxy settings.</returns>
  31222. </member>
  31223. <member name="T:Best.HTTP.HostSetting.HostManager">
  31224. <summary>
  31225. The <see cref="T:Best.HTTP.HostSetting.HostManager"/> class provides centralized management for <see cref="T:Best.HTTP.HostSetting.HostVariant"/> objects associated with HTTP requests and connections.
  31226. </summary>
  31227. <remarks>
  31228. <para>
  31229. The <see cref="T:Best.HTTP.HostSetting.HostManager"/> class acts as a central registry for managing <see cref="T:Best.HTTP.HostSetting.HostVariant"/> objects, each associated with a unique <see cref="T:Best.HTTP.HostSetting.HostKey"/>.
  31230. It facilitates the creation, retrieval, and management of <see cref="T:Best.HTTP.HostSetting.HostVariant"/> instances based on HTTP requests and connections.
  31231. </para>
  31232. <para>
  31233. A <see cref="T:Best.HTTP.HostSetting.HostVariant"/> represents a specific host and port combination (e.g., "http://example.com:80" or "https://example.com:443") and
  31234. manages the connections and request queues for that host. The class ensures that a single <see cref="T:Best.HTTP.HostSetting.HostVariant"/> instance is used for
  31235. each unique host, helping optimize resource usage and connection pooling.
  31236. </para>
  31237. <para>
  31238. Key features of the <see cref="T:Best.HTTP.HostSetting.HostManager"/> class include:
  31239. </para>
  31240. <list type="bullet">
  31241. <item>
  31242. <term>Creation and Retrieval</term>
  31243. <description>
  31244. The class allows you to create and retrieve <see cref="T:Best.HTTP.HostSetting.HostVariant"/> instances based on HTTP requests, connections, or <see cref="T:Best.HTTP.HostSetting.HostKey"/>.
  31245. It ensures that a single <see cref="T:Best.HTTP.HostSetting.HostVariant"/> is used for each unique host.
  31246. </description>
  31247. </item>
  31248. <item>
  31249. <term>Queue Management</term>
  31250. <description>
  31251. The <see cref="T:Best.HTTP.HostSetting.HostManager"/> manages the queue of pending requests for each <see cref="T:Best.HTTP.HostSetting.HostVariant"/>, ensuring efficient request processing.
  31252. </description>
  31253. </item>
  31254. <item>
  31255. <term>Connection Management</term>
  31256. <description>
  31257. The class handles the management of connections associated with <see cref="T:Best.HTTP.HostSetting.HostVariant"/> objects, including recycling idle connections,
  31258. removing idle connections, and shutting down connections when needed.
  31259. </description>
  31260. </item>
  31261. </list>
  31262. <para>
  31263. Usage of the <see cref="T:Best.HTTP.HostSetting.HostManager"/> class is typically transparent to developers and is handled internally by the Best HTTP library. However,
  31264. it provides a convenient and efficient way to manage connections and requests when needed.
  31265. </para>
  31266. </remarks>
  31267. </member>
  31268. <member name="F:Best.HTTP.HostSetting.HostManager.hosts">
  31269. <summary>
  31270. Dictionary to store <see cref="T:Best.HTTP.HostSetting.HostKey"/>-<see cref="T:Best.HTTP.HostSetting.HostVariant"/> mappings.
  31271. </summary>
  31272. </member>
  31273. <member name="M:Best.HTTP.HostSetting.HostManager.GetHostVariant(Best.HTTP.HTTPRequest)">
  31274. <summary>
  31275. Gets the <see cref="T:Best.HTTP.HostSetting.HostVariant"/> associated with an HTTP request.
  31276. </summary>
  31277. <param name="request">The HTTP request.</param>
  31278. <returns>The <see cref="T:Best.HTTP.HostSetting.HostVariant"/> for the request's host.</returns>
  31279. </member>
  31280. <member name="M:Best.HTTP.HostSetting.HostManager.GetHostVariant(Best.HTTP.Hosts.Connections.ConnectionBase)">
  31281. <summary>
  31282. Gets the <see cref="T:Best.HTTP.HostSetting.HostVariant"/> associated with a connection.
  31283. </summary>
  31284. <param name="connection">The HTTP connection.</param>
  31285. <returns>The <see cref="T:Best.HTTP.HostSetting.HostVariant"/> for the connection's host.</returns>
  31286. </member>
  31287. <member name="M:Best.HTTP.HostSetting.HostManager.GetHostVariant(Best.HTTP.HostSetting.HostKey)">
  31288. <summary>
  31289. Gets the <see cref="T:Best.HTTP.HostSetting.HostVariant"/> associated with a HostKey.
  31290. </summary>
  31291. <param name="key">The HostKey for which to get the HostVariant.</param>
  31292. <returns>The <see cref="T:Best.HTTP.HostSetting.HostVariant"/> for the specified HostKey.</returns>
  31293. </member>
  31294. <member name="M:Best.HTTP.HostSetting.HostManager.RemoveAllIdleConnections">
  31295. <summary>
  31296. Removes all idle connections for all hosts.
  31297. </summary>
  31298. </member>
  31299. <member name="M:Best.HTTP.HostSetting.HostManager.TryToSendQueuedRequests">
  31300. <summary>
  31301. Tries to send queued requests for all hosts.
  31302. </summary>
  31303. </member>
  31304. <member name="M:Best.HTTP.HostSetting.HostManager.Shutdown">
  31305. <summary>
  31306. Shuts down all connections for all hosts.
  31307. </summary>
  31308. </member>
  31309. <member name="M:Best.HTTP.HostSetting.HostManager.Clear">
  31310. <summary>
  31311. Clears all hosts and their associated variants.
  31312. </summary>
  31313. </member>
  31314. <member name="T:Best.HTTP.HostSetting.HostProtocolSupport">
  31315. <summary>
  31316. An enumeration representing the protocol support for a host.
  31317. </summary>
  31318. </member>
  31319. <member name="F:Best.HTTP.HostSetting.HostProtocolSupport.Unknown">
  31320. <summary>
  31321. Protocol support is unknown or undetermined.
  31322. </summary>
  31323. </member>
  31324. <member name="F:Best.HTTP.HostSetting.HostProtocolSupport.HTTP1">
  31325. <summary>
  31326. The host supports HTTP/1.
  31327. </summary>
  31328. </member>
  31329. <member name="F:Best.HTTP.HostSetting.HostProtocolSupport.HTTP2">
  31330. <summary>
  31331. The host supports HTTP/2.
  31332. </summary>
  31333. </member>
  31334. <member name="F:Best.HTTP.HostSetting.HostProtocolSupport.File">
  31335. <summary>
  31336. This is a file-based host.
  31337. </summary>
  31338. </member>
  31339. <member name="T:Best.HTTP.HostSetting.HostVariant">
  31340. <summary>
  31341. <para>The HostVariant class is a critical component in managing HTTP connections and handling HTTP requests for a specific host. It maintains a queue of requests and a list of active connections associated with the host, ensuring efficient utilization of available resources. Additionally, it supports protocol version detection (HTTP/1 or HTTP/2) for optimized communication with the host.</para>
  31342. <list type="bullet">
  31343. <item><description>It maintains a queue of requests to ensure efficient and controlled use of available connections.</description></item>
  31344. <item><description>It supports HTTP/1 and HTTP/2 protocol versions, allowing requests to be sent using the appropriate protocol based on the host's protocol support.</description></item>
  31345. <item><description>Provides methods for sending requests, recycling connections, managing connection state, and handling the shutdown of connections and the host variant itself.</description></item>
  31346. <item><description>It includes logging for diagnostic purposes, helping to monitor and debug the behavior of connections and requests.</description></item>
  31347. </list>
  31348. <para>In summary, the HostVariant class plays a central role in managing HTTP connections and requests for a specific host, ensuring efficient and reliable communication with that host while supporting different protocol versions.</para>
  31349. </summary>
  31350. </member>
  31351. <member name="T:Best.HTTP.HTTPMethods">
  31352. <summary>
  31353. Represents the HTTP methods used in HTTP requests.
  31354. </summary>
  31355. </member>
  31356. <member name="F:Best.HTTP.HTTPMethods.Get">
  31357. <summary>
  31358. The GET method means retrieve whatever information (in the form of an entity) is identified by the Request-URI.
  31359. If the Request-URI refers to a data-producing process, it is the produced data which shall be returned as the
  31360. entity in the response and not the source text of the process, unless that text happens to be the output of the process.
  31361. </summary>
  31362. </member>
  31363. <member name="F:Best.HTTP.HTTPMethods.Head">
  31364. <summary>
  31365. The HEAD method is identical to GET except that the server MUST NOT return a message-body in the response.
  31366. The metainformation contained in the HTTP headers in response to a HEAD request SHOULD be identical to the information sent in response to a GET request.
  31367. This method can be used for obtaining metainformation about the entity implied by the request without transferring the entity-body itself.
  31368. This method is often used for testing hypertext links for validity, accessibility, and recent modification.
  31369. </summary>
  31370. </member>
  31371. <member name="F:Best.HTTP.HTTPMethods.Post">
  31372. <summary>
  31373. The POST method is used to request that the origin server accept the entity enclosed in the request as a new subordinate of the resource identified by the Request-URI in the Request-Line.
  31374. POST is designed to allow a uniform method to cover the following functions:
  31375. <list type="bullet">
  31376. <item><description>Annotation of existing resources;</description></item>
  31377. <item><description>Posting a message to a bulletin board, newsgroup, mailing list, or similar group of articles;</description></item>
  31378. <item><description>Providing a block of data, such as the result of submitting a form, to a data-handling process;</description></item>
  31379. <item><description>Extending a database through an append operation.</description></item>
  31380. </list>
  31381. The actual function performed by the POST method is determined by the server and is usually dependent on the Request-URI.
  31382. The posted entity is subordinate to that URI in the same way that a file is subordinate to a directory containing it,
  31383. a news article is subordinate to a newsgroup to which it is posted, or a record is subordinate to a database.
  31384. The action performed by the POST method might not result in a resource that can be identified by a URI. In this case,
  31385. either 200 (OK) or 204 (No Content) is the appropriate response status, depending on whether or not the response includes an entity that describes the result.
  31386. </summary>
  31387. </member>
  31388. <member name="F:Best.HTTP.HTTPMethods.Put">
  31389. <summary>
  31390. The PUT method requests that the enclosed entity be stored under the supplied Request-URI.
  31391. If the Request-URI refers to an already existing resource, the enclosed entity SHOULD be considered as a modified version of the one residing on the origin server.
  31392. If the Request-URI does not point to an existing resource, and that URI is capable of being defined as a new resource by the requesting user agent,
  31393. the origin server can create the resource with that URI. If a new resource is created, the origin server MUST inform the user agent via the 201 (Created) response.
  31394. If an existing resource is modified, either the 200 (OK) or 204 (No Content) response codes SHOULD be sent to indicate successful completion of the request.
  31395. If the resource could not be created or modified with the Request-URI, an appropriate error response SHOULD be given that reflects the nature of the problem.
  31396. The recipient of the entity MUST NOT ignore any Content-* (e.g. Content-Range) headers that it does not understand or implement and MUST return a 501 (Not Implemented) response in such cases.
  31397. </summary>
  31398. </member>
  31399. <member name="F:Best.HTTP.HTTPMethods.Delete">
  31400. <summary>
  31401. The DELETE method requests that the origin server delete the resource identified by the Request-URI. This method MAY be overridden by human intervention (or other means) on the origin server.
  31402. The client cannot be guaranteed that the operation has been carried out, even if the status code returned from the origin server indicates that the action has been completed successfully.
  31403. However, the server SHOULD NOT indicate success unless, at the time the response is given, it intends to delete the resource or move it to an inaccessible location.
  31404. A successful response SHOULD be 200 (OK) if the response includes an entity describing the status, 202 (Accepted) if the action has not yet been enacted, or 204 (No Content)
  31405. if the action has been enacted but the response does not include an entity.
  31406. </summary>
  31407. </member>
  31408. <member name="F:Best.HTTP.HTTPMethods.Patch">
  31409. <summary>
  31410. The PATCH method requests that a set of changes described in the request entity be applied to the resource identified by the Request-URI.
  31411. The set of changes is represented in a format called a "patchdocument" identified by a media type. If the Request-URI does not point to an existing resource,
  31412. the server MAY create a new resource, depending on the patch document type (whether it can logically modify a null resource) and permissions, etc.
  31413. </summary>
  31414. <remarks>
  31415. More details can be found here:
  31416. <list type="bullet">
  31417. <item><description><see href="http://tools.ietf.org/html/rfc5789">RFC-5789</see></description></item>
  31418. <item><description><see href="http://restcookbook.com/HTTP%20Methods/patch/">When should we use the PATCH HTTP method?</see></description></item>
  31419. </list>
  31420. </remarks>
  31421. </member>
  31422. <member name="F:Best.HTTP.HTTPMethods.Trace">
  31423. <summary>
  31424. The HTTP TRACE method is used to perform a message loop-back test along the path to the target resource.
  31425. </summary>
  31426. </member>
  31427. <member name="F:Best.HTTP.HTTPMethods.Merge">
  31428. <summary>
  31429. The HTTP MERGE method is used to apply modifications to an existing resource.
  31430. The MERGE HTTP method is not as commonly used as other methods like GET, POST, or PUT.
  31431. It's often used in specific WebDAV (Web Distributed Authoring and Versioning) scenarios.
  31432. </summary>
  31433. </member>
  31434. <member name="F:Best.HTTP.HTTPMethods.Options">
  31435. <summary>
  31436. The HTTP OPTIONS method requests permitted communication options for a given URL or server.
  31437. A client can specify a URL with this method, or an asterisk (*) to refer to the entire server.
  31438. </summary>
  31439. <remarks>
  31440. More details can be found here:
  31441. <list type="bullet">
  31442. <item><description><see href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/OPTIONS">Mozilla Developer Networks - OPTIONS</see></description></item>
  31443. </list>
  31444. </remarks>
  31445. </member>
  31446. <member name="F:Best.HTTP.HTTPMethods.Connect">
  31447. <summary>
  31448. The CONNECT method is primarily used in the context of HTTP proxies to establish a network connection through the proxy to a target host.
  31449. It is used in the context of the HTTP CONNECT tunneling method.
  31450. </summary>
  31451. <remarks>
  31452. More details can be found here:
  31453. <list type="bullet">
  31454. <item><description><see href="https://datatracker.ietf.org/doc/html/rfc2616#section-9.9">RFC-2616</see></description></item>
  31455. <item><description><see href="https://tools.ietf.org/html/rfc8441">RFC-8441</see></description></item>
  31456. </list>
  31457. </remarks>
  31458. </member>
  31459. <member name="F:Best.HTTP.HTTPMethods.Query">
  31460. <summary>
  31461. The HTTP QUERY method is used to retrieve data based on a query parameter or search criteria.
  31462. The QUERY method is not a standard HTTP method, and its usage may vary depending on the specific application or API you are working with.
  31463. It might be used for querying data or resources with specific parameters.
  31464. Details about the QUERY method would depend on the API or service you are interacting with.
  31465. You should refer to the documentation or specifications provided by the API/service provider.
  31466. </summary>
  31467. <remarks>
  31468. More details can be found here:
  31469. <list type="bullet">
  31470. <item><description><see href="https://horovits.medium.com/http-s-new-method-for-data-apis-http-query-1ff71e6f73f3">HTTP's New Method For Data APIs: HTTP QUERY</see></description></item>
  31471. <item><description><see href="https://datatracker.ietf.org/doc/draft-ietf-httpbis-safe-method-w-body/">The HTTP QUERY Method (Draft)</see></description></item>
  31472. </list>
  31473. </remarks>
  31474. </member>
  31475. <member name="T:Best.HTTP.HTTPRange">
  31476. <summary>
  31477. Represents an HTTP range that specifies the byte range of a response content, received as an answer for a range-request.
  31478. </summary>
  31479. </member>
  31480. <member name="P:Best.HTTP.HTTPRange.FirstBytePos">
  31481. <summary>
  31482. Gets the position of the first byte in the range that the server sent.
  31483. </summary>
  31484. </member>
  31485. <member name="P:Best.HTTP.HTTPRange.LastBytePos">
  31486. <summary>
  31487. Gets the position of the last byte in the range that the server sent.
  31488. </summary>
  31489. </member>
  31490. <member name="P:Best.HTTP.HTTPRange.ContentLength">
  31491. <summary>
  31492. Gets the total length of the full entity-body on the server. Returns -1 if this length is unknown or difficult to determine.
  31493. </summary>
  31494. </member>
  31495. <member name="P:Best.HTTP.HTTPRange.IsValid">
  31496. <summary>
  31497. Gets a value indicating whether the HTTP range is valid.
  31498. </summary>
  31499. </member>
  31500. <member name="T:Best.HTTP.OnRequestFinishedDelegate">
  31501. <summary>
  31502. Delegate for a callback function that is called after the request is fully processed.
  31503. </summary>
  31504. </member>
  31505. <member name="T:Best.HTTP.OnHeaderEnumerationDelegate">
  31506. <summary>
  31507. Delegate for enumerating headers during request preparation.
  31508. </summary>
  31509. <param name="header">The header name.</param>
  31510. <param name="values">A list of header values.</param>
  31511. </member>
  31512. <member name="T:Best.HTTP.HTTPRequest">
  31513. <summary>
  31514. Represents an HTTP request that allows you to send HTTP requests to remote servers and receive responses asynchronously.
  31515. </summary>
  31516. <remarks>
  31517. <list type="bullet">
  31518. <item><term>Asynchronous HTTP requests</term><description>Utilize a Task-based API for performing HTTP requests asynchronously.</description></item>
  31519. <item><term>Unity coroutine support</term><description>Seamlessly integrate with Unity's coroutine system for coroutine-based request handling.</description></item>
  31520. <item><term>HTTP method support</term><description>Support for various HTTP methods including GET, POST, PUT, DELETE, and more.</description></item>
  31521. <item><term>Compression and decompression</term><description>Automatic request and response compression and decompression for efficient data transfer.</description></item>
  31522. <item><term>Timing information</term><description>Collect detailed timing information about the request for performance analysis.</description></item>
  31523. <item><term>Upload and download support</term><description>Support for uploading and downloading files with progress tracking.</description></item>
  31524. <item><term>Customizable</term><description>Extensive options for customizing request headers, handling cookies, and more.</description></item>
  31525. <item><term>Redirection handling</term><description>Automatic handling of request redirections for a seamless experience.</description></item>
  31526. <item><term>Proxy server support</term><description>Ability to route requests through proxy servers for enhanced privacy and security.</description></item>
  31527. <item><term>Authentication</term><description>Automatic authentication handling using authenticators for secure communication.</description></item>
  31528. <item><term>Cancellation support</term><description>Ability to cancel requests to prevent further processing and release resources.</description></item>
  31529. </list>
  31530. </remarks>
  31531. </member>
  31532. <member name="M:Best.HTTP.HTTPRequest.CreateGet(System.String)">
  31533. <summary>
  31534. Creates an <see cref="F:Best.HTTP.HTTPMethods.Get">HTTP GET</see> request with the specified URL.
  31535. </summary>
  31536. <param name="url">The URL of the request.</param>
  31537. <returns>An HTTPRequest instance for the GET request.</returns>
  31538. </member>
  31539. <member name="M:Best.HTTP.HTTPRequest.CreateGet(System.Uri)">
  31540. <summary>
  31541. Creates an <see cref="F:Best.HTTP.HTTPMethods.Get">HTTP GET</see> request with the specified URI.
  31542. </summary>
  31543. <param name="uri">The URI of the request.</param>
  31544. <returns>An HTTPRequest instance for the GET request.</returns>
  31545. </member>
  31546. <member name="M:Best.HTTP.HTTPRequest.CreateGet(System.String,Best.HTTP.OnRequestFinishedDelegate)">
  31547. <summary>
  31548. Creates an <see cref="F:Best.HTTP.HTTPMethods.Get">HTTP GET</see> request with the specified URL and registers a callback function to be called
  31549. when the request is fully processed.
  31550. </summary>
  31551. <param name="url">The URL of the request.</param>
  31552. <param name="callback">A callback function to be called when the request is finished.</param>
  31553. <returns>An HTTPRequest instance for the GET request.</returns>
  31554. </member>
  31555. <member name="M:Best.HTTP.HTTPRequest.CreateGet(System.Uri,Best.HTTP.OnRequestFinishedDelegate)">
  31556. <summary>
  31557. Creates an <see cref="F:Best.HTTP.HTTPMethods.Get">HTTP GET</see> request with the specified URI and registers a callback function to be called
  31558. when the request is fully processed.
  31559. </summary>
  31560. <param name="uri">The URI of the request.</param>
  31561. <param name="callback">A callback function to be called when the request is finished.</param>
  31562. <returns>An HTTPRequest instance for the GET request.</returns>
  31563. </member>
  31564. <member name="M:Best.HTTP.HTTPRequest.CreatePost(System.String)">
  31565. <summary>
  31566. Creates an <see cref="F:Best.HTTP.HTTPMethods.Post">HTTP POST</see> request with the specified URL.
  31567. </summary>
  31568. <param name="url">The URL of the request.</param>
  31569. <returns>An HTTPRequest instance for the POST request.</returns>
  31570. </member>
  31571. <member name="M:Best.HTTP.HTTPRequest.CreatePost(System.Uri)">
  31572. <summary>
  31573. Creates an <see cref="F:Best.HTTP.HTTPMethods.Post">HTTP POST</see> request with the specified URI.
  31574. </summary>
  31575. <param name="uri">The URI of the request.</param>
  31576. <returns>An HTTPRequest instance for the POST request.</returns>
  31577. </member>
  31578. <member name="M:Best.HTTP.HTTPRequest.CreatePost(System.String,Best.HTTP.OnRequestFinishedDelegate)">
  31579. <summary>
  31580. Creates an <see cref="F:Best.HTTP.HTTPMethods.Post">HTTP POST</see> request with the specified URL and registers a callback function to be called
  31581. when the request is fully processed.
  31582. </summary>
  31583. <param name="url">The URL of the request.</param>
  31584. <param name="callback">A callback function to be called when the request is finished.</param>
  31585. <returns>An HTTPRequest instance for the POST request.</returns>
  31586. </member>
  31587. <member name="M:Best.HTTP.HTTPRequest.CreatePost(System.Uri,Best.HTTP.OnRequestFinishedDelegate)">
  31588. <summary>
  31589. Creates an <see cref="F:Best.HTTP.HTTPMethods.Post">HTTP POST</see> request with the specified URI and registers a callback function to be called
  31590. when the request is fully processed.
  31591. </summary>
  31592. <param name="uri">The URI of the request.</param>
  31593. <param name="callback">A callback function to be called when the request is finished.</param>
  31594. <returns>An HTTPRequest instance for the POST request.</returns>
  31595. </member>
  31596. <member name="M:Best.HTTP.HTTPRequest.CreatePut(System.String)">
  31597. <summary>
  31598. Creates an <see cref="F:Best.HTTP.HTTPMethods.Put">HTTP PUT</see> request with the specified URL.
  31599. </summary>
  31600. <param name="url">The URL of the request.</param>
  31601. <returns>An HTTPRequest instance for the PUT request.</returns>
  31602. </member>
  31603. <member name="M:Best.HTTP.HTTPRequest.CreatePut(System.Uri)">
  31604. <summary>
  31605. Creates an <see cref="F:Best.HTTP.HTTPMethods.Put">HTTP PUT</see> request with the specified URI.
  31606. </summary>
  31607. <param name="uri">The URI of the request.</param>
  31608. <returns>An HTTPRequest instance for the PUT request.</returns>
  31609. </member>
  31610. <member name="M:Best.HTTP.HTTPRequest.CreatePut(System.String,Best.HTTP.OnRequestFinishedDelegate)">
  31611. <summary>
  31612. Creates an <see cref="F:Best.HTTP.HTTPMethods.Put">HTTP PUT</see> request with the specified URL and registers a callback function to be called
  31613. when the request is fully processed.
  31614. </summary>
  31615. <param name="url">The URL of the request.</param>
  31616. <param name="callback">A callback function to be called when the request is finished.</param>
  31617. <returns>An HTTPRequest instance for the PUT request.</returns>
  31618. </member>
  31619. <member name="M:Best.HTTP.HTTPRequest.CreatePut(System.Uri,Best.HTTP.OnRequestFinishedDelegate)">
  31620. <summary>
  31621. Creates an <see cref="F:Best.HTTP.HTTPMethods.Put">HTTP PUT</see> request with the specified URI and registers a callback function to be called
  31622. when the request is fully processed.
  31623. </summary>
  31624. <param name="uri">The URI of the request.</param>
  31625. <param name="callback">A callback function to be called when the request is finished.</param>
  31626. <returns>An HTTPRequest instance for the PUT request.</returns>
  31627. </member>
  31628. <member name="F:Best.HTTP.HTTPRequest.MethodNames">
  31629. <summary>
  31630. Cached uppercase values to save some cpu cycles and GC alloc per request.
  31631. </summary>
  31632. </member>
  31633. <member name="P:Best.HTTP.HTTPRequest.MethodType">
  31634. <summary>
  31635. The method that how we want to process our request the server.
  31636. </summary>
  31637. </member>
  31638. <member name="P:Best.HTTP.HTTPRequest.Uri">
  31639. <summary>
  31640. The original request's Uri.
  31641. </summary>
  31642. </member>
  31643. <member name="P:Best.HTTP.HTTPRequest.CurrentUri">
  31644. <summary>
  31645. If redirected it contains the RedirectUri.
  31646. </summary>
  31647. </member>
  31648. <member name="P:Best.HTTP.HTTPRequest.CurrentHostKey">
  31649. <summary>
  31650. A host-key that can be used to find the right host-variant for the request.
  31651. </summary>
  31652. </member>
  31653. <member name="P:Best.HTTP.HTTPRequest.Response">
  31654. <summary>
  31655. The response received from the server.
  31656. </summary>
  31657. <remarks>If an exception occurred during reading of the response stream or can't connect to the server, this will be null!</remarks>
  31658. </member>
  31659. <member name="F:Best.HTTP.HTTPRequest.DownloadSettings">
  31660. <summary>
  31661. Download related options and settings.
  31662. </summary>
  31663. </member>
  31664. <member name="F:Best.HTTP.HTTPRequest.UploadSettings">
  31665. <summary>
  31666. Upload related options and settings.
  31667. </summary>
  31668. </member>
  31669. <member name="F:Best.HTTP.HTTPRequest.TimeoutSettings">
  31670. <summary>
  31671. Timeout settings for the request.
  31672. </summary>
  31673. </member>
  31674. <member name="F:Best.HTTP.HTTPRequest.RetrySettings">
  31675. <summary>
  31676. Retry settings for the request.
  31677. </summary>
  31678. </member>
  31679. <member name="F:Best.HTTP.HTTPRequest.ProxySettings">
  31680. <summary>
  31681. Proxy settings for the request.
  31682. </summary>
  31683. </member>
  31684. <member name="P:Best.HTTP.HTTPRequest.RedirectSettings">
  31685. <summary>
  31686. Redirect settings for the request.
  31687. </summary>
  31688. </member>
  31689. <member name="P:Best.HTTP.HTTPRequest.Callback">
  31690. <summary>
  31691. The callback function that will be called after the request is fully processed.
  31692. </summary>
  31693. </member>
  31694. <member name="P:Best.HTTP.HTTPRequest.IsCancellationRequested">
  31695. <summary>
  31696. Indicates if <see cref="M:Best.HTTP.HTTPRequest.Abort"/> is called on this request.
  31697. </summary>
  31698. </member>
  31699. <member name="P:Best.HTTP.HTTPRequest.CancellationTokenSource">
  31700. <summary>
  31701. Gets the cancellation token source for this request.
  31702. </summary>
  31703. </member>
  31704. <member name="F:Best.HTTP.HTTPRequest.OnCancellationRequested">
  31705. <summary>
  31706. Action called when <see cref="M:Best.HTTP.HTTPRequest.Abort"/> function is invoked.
  31707. </summary>
  31708. </member>
  31709. <member name="P:Best.HTTP.HTTPRequest.Exception">
  31710. <summary>
  31711. Stores any exception that occurs during processing of the request or response.
  31712. </summary>
  31713. <remarks>This property if for debugging purposes as <see href="https://github.com/Benedicht/BestHTTP-Issues/issues/174">seen here</see>!</remarks>
  31714. </member>
  31715. <member name="P:Best.HTTP.HTTPRequest.Tag">
  31716. <summary>
  31717. Any user-object that can be passed with the request.
  31718. </summary>
  31719. </member>
  31720. <member name="P:Best.HTTP.HTTPRequest.State">
  31721. <summary>
  31722. Current state of this request.
  31723. </summary>
  31724. </member>
  31725. <member name="P:Best.HTTP.HTTPRequest.Timing">
  31726. <summary>
  31727. Timing information about the request.
  31728. </summary>
  31729. </member>
  31730. <member name="F:Best.HTTP.HTTPRequest.Authenticator">
  31731. <summary>
  31732. An IAuthenticator implementation that can be used to authenticate the request.
  31733. </summary>
  31734. <remarks>Out-of-the-box included authenticators are <see cref="T:Best.HTTP.Request.Authenticators.CredentialAuthenticator"/> and <see cref="T:Best.HTTP.Request.Authenticators.BearerTokenAuthenticator"/>.</remarks>
  31735. </member>
  31736. <member name="P:Best.HTTP.HTTPRequest.Context">
  31737. <summary>
  31738. Logging context of the request.
  31739. </summary>
  31740. </member>
  31741. <member name="M:Best.HTTP.HTTPRequest.#ctor(System.String)">
  31742. <summary>
  31743. Creates an HTTP GET request with the specified URL.
  31744. </summary>
  31745. <param name="url">The URL of the request.</param>
  31746. </member>
  31747. <member name="M:Best.HTTP.HTTPRequest.#ctor(System.String,Best.HTTP.OnRequestFinishedDelegate)">
  31748. <summary>
  31749. Creates an HTTP GET request with the specified URL and registers a callback function to be called
  31750. when the request is fully processed.
  31751. </summary>
  31752. <param name="url">The URL of the request.</param>
  31753. <param name="callback">A callback function to be called when the request is finished.</param>
  31754. </member>
  31755. <member name="M:Best.HTTP.HTTPRequest.#ctor(System.String,Best.HTTP.HTTPMethods)">
  31756. <summary>
  31757. Creates an HTTP GET request with the specified URL and HTTP method type.
  31758. </summary>
  31759. <param name="url">The URL of the request.</param>
  31760. <param name="methodType">The HTTP method type for the request (e.g., GET, POST, PUT).</param>
  31761. </member>
  31762. <member name="M:Best.HTTP.HTTPRequest.#ctor(System.String,Best.HTTP.HTTPMethods,Best.HTTP.OnRequestFinishedDelegate)">
  31763. <summary>
  31764. Creates an HTTP request with the specified URL, HTTP method type, and registers a callback function to be called
  31765. when the request is fully processed.
  31766. </summary>
  31767. <param name="url">The URL of the request.</param>
  31768. <param name="methodType">The HTTP method type for the request (e.g., GET, POST, PUT).</param>
  31769. <param name="callback">A callback function to be called when the request is finished.</param>
  31770. </member>
  31771. <member name="M:Best.HTTP.HTTPRequest.#ctor(System.Uri)">
  31772. <summary>
  31773. Creates an HTTP GET request with the specified URI.
  31774. </summary>
  31775. <param name="uri">The URI of the request.</param>
  31776. </member>
  31777. <member name="M:Best.HTTP.HTTPRequest.#ctor(System.Uri,Best.HTTP.OnRequestFinishedDelegate)">
  31778. <summary>
  31779. Creates an HTTP GET request with the specified URI and registers a callback function to be called
  31780. when the request is fully processed.
  31781. </summary>
  31782. <param name="uri">The URI of the request.</param>
  31783. <param name="callback">A callback function to be called when the request is finished.</param>
  31784. </member>
  31785. <member name="M:Best.HTTP.HTTPRequest.#ctor(System.Uri,Best.HTTP.HTTPMethods)">
  31786. <summary>
  31787. Creates an HTTP request with the specified URI and HTTP method type.
  31788. </summary>
  31789. <param name="uri">The URI of the request.</param>
  31790. <param name="methodType">The HTTP method type for the request (e.g., GET, POST, PUT).</param>
  31791. </member>
  31792. <member name="M:Best.HTTP.HTTPRequest.#ctor(System.Uri,Best.HTTP.HTTPMethods,Best.HTTP.OnRequestFinishedDelegate)">
  31793. <summary>
  31794. Creates an HTTP request with the specified URI, HTTP method type, and registers a callback function
  31795. to be called when the request is fully processed.
  31796. </summary>
  31797. <param name="uri">The URI of the request.</param>
  31798. <param name="methodType">The HTTP method type for the request (e.g., GET, POST, PUT).</param>
  31799. <param name="callback">A callback function to be called when the request is finished.</param>
  31800. </member>
  31801. <member name="M:Best.HTTP.HTTPRequest.AddHeader(System.String,System.String)">
  31802. <summary>
  31803. Adds a header-value pair to the Headers. Use it to add custom headers to the request.
  31804. </summary>
  31805. <example>AddHeader("User-Agent', "FooBar 1.0")</example>
  31806. </member>
  31807. <member name="M:Best.HTTP.HTTPRequest.SetHeader(System.String,System.String)">
  31808. <summary>
  31809. For the given header name, removes any previously added values and sets the given one.
  31810. </summary>
  31811. </member>
  31812. <member name="M:Best.HTTP.HTTPRequest.RemoveHeader(System.String)">
  31813. <summary>
  31814. Removes the specified header and all of its associated values. Returns <c>true</c>, if the header found and succesfully removed.
  31815. </summary>
  31816. </member>
  31817. <member name="M:Best.HTTP.HTTPRequest.HasHeader(System.String)">
  31818. <summary>
  31819. Returns <c>true</c> if the given head name is already in the <see cref="P:Best.HTTP.HTTPRequest.Headers"/>.
  31820. </summary>
  31821. </member>
  31822. <member name="M:Best.HTTP.HTTPRequest.GetFirstHeaderValue(System.String)">
  31823. <summary>
  31824. Returns the first header or <c>null</c> for the given header name.
  31825. </summary>
  31826. </member>
  31827. <member name="M:Best.HTTP.HTTPRequest.GetHeaderValues(System.String)">
  31828. <summary>
  31829. Returns all header values for the given header or <c>null</c>.
  31830. </summary>
  31831. </member>
  31832. <member name="M:Best.HTTP.HTTPRequest.RemoveHeaders">
  31833. <summary>
  31834. Removes all headers.
  31835. </summary>
  31836. </member>
  31837. <member name="M:Best.HTTP.HTTPRequest.SetRangeHeader(System.Int64)">
  31838. <summary>
  31839. Sets the Range header to download the content from the given byte position. See http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.35
  31840. </summary>
  31841. <param name="firstBytePos">Start position of the download.</param>
  31842. </member>
  31843. <member name="M:Best.HTTP.HTTPRequest.SetRangeHeader(System.Int64,System.Int64)">
  31844. <summary>
  31845. Sets the Range header to download the content from the given byte position to the given last position. See http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.35
  31846. </summary>
  31847. <param name="firstBytePos">Start position of the download.</param>
  31848. <param name="lastBytePos">The end position of the download.</param>
  31849. </member>
  31850. <member name="M:Best.HTTP.HTTPRequest.Send">
  31851. <summary>
  31852. Starts processing the request.
  31853. </summary>
  31854. </member>
  31855. <member name="M:Best.HTTP.HTTPRequest.Abort">
  31856. <summary>
  31857. Cancels any further processing of the HTTP request.
  31858. </summary>
  31859. </member>
  31860. <member name="M:Best.HTTP.HTTPRequest.Clear">
  31861. <summary>
  31862. Resets the request for a state where switching MethodType is possible.
  31863. </summary>
  31864. </member>
  31865. <member name="P:Best.HTTP.HTTPRequest.Current">
  31866. <summary>
  31867. <see cref="P:System.Collections.IEnumerator.Current"/> implementation, required for <see cref="T:UnityEngine.Coroutine"/> support.
  31868. </summary>
  31869. </member>
  31870. <member name="M:Best.HTTP.HTTPRequest.MoveNext">
  31871. <summary>
  31872. <see cref="M:System.Collections.IEnumerator.MoveNext"/> implementation, required for <see cref="T:UnityEngine.Coroutine"/> support.
  31873. </summary>
  31874. <returns><c>true</c> if the request isn't finished yet.</returns>
  31875. </member>
  31876. <member name="M:Best.HTTP.HTTPRequest.Reset">
  31877. <summary>
  31878. <see cref="M:System.Collections.IEnumerator.MoveNext"/> implementation throwing <see cref="T:System.NotImplementedException"/>, required for <see cref="T:UnityEngine.Coroutine"/> support.
  31879. </summary>
  31880. <exception cref="T:System.NotImplementedException"></exception>
  31881. </member>
  31882. <member name="M:Best.HTTP.HTTPRequest.Dispose">
  31883. <summary>
  31884. Disposes of resources used by the HTTPRequest instance.
  31885. </summary>
  31886. </member>
  31887. <member name="T:Best.HTTP.AsyncHTTPException">
  31888. <summary>
  31889. Represents an exception thrown during or as a result of a Task-based asynchronous HTTP operations.
  31890. </summary>
  31891. </member>
  31892. <member name="F:Best.HTTP.AsyncHTTPException.StatusCode">
  31893. <summary>
  31894. Gets the status code of the server's response.
  31895. </summary>
  31896. </member>
  31897. <member name="F:Best.HTTP.AsyncHTTPException.Content">
  31898. <summary>
  31899. Gets the content sent by the server. This is usually an error page for 4xx or 5xx responses.
  31900. </summary>
  31901. </member>
  31902. <member name="T:Best.HTTP.HTTPRequestAsyncExtensions">
  31903. <summary>
  31904. A collection of extension methods for working with HTTP requests asynchronously using <see cref="T:System.Threading.Tasks.Task`1"/>.
  31905. </summary>
  31906. </member>
  31907. <member name="M:Best.HTTP.HTTPRequestAsyncExtensions.GetAssetBundleAsync(Best.HTTP.HTTPRequest,System.Threading.CancellationToken)">
  31908. <summary>
  31909. Asynchronously sends an HTTP request and retrieves the response as an <see cref="T:UnityEngine.AssetBundle"/>.
  31910. </summary>
  31911. <param name="request">The <see cref="T:Best.HTTP.HTTPRequest"/> to send.</param>
  31912. <param name="token">A cancellation token that can be used to cancel the operation.</param>
  31913. <returns>
  31914. A Task that represents the asynchronous operation. The Task will complete with the retrieved AssetBundle
  31915. if the request succeeds. If the request fails or is canceled, the Task will complete with an exception.
  31916. </returns>
  31917. </member>
  31918. <member name="M:Best.HTTP.HTTPRequestAsyncExtensions.GetHTTPResponseAsync(Best.HTTP.HTTPRequest,System.Threading.CancellationToken)">
  31919. <summary>
  31920. Asynchronously sends an HTTP request and retrieves the raw <see cref="T:Best.HTTP.HTTPResponse"/>.
  31921. </summary>
  31922. <remarks>
  31923. This method is particularly useful when you want to access the raw response without any specific processing
  31924. like converting the data into a string, texture, or other formats. It provides flexibility in handling
  31925. the response for custom or advanced use cases.
  31926. </remarks>
  31927. <param name="request">The <see cref="T:Best.HTTP.HTTPRequest"/> to send.</param>
  31928. <param name="token">An optional <see cref="T:System.Threading.CancellationToken"/> that can be used to cancel the operation.</param>
  31929. <returns>
  31930. A <see cref="T:System.Threading.Tasks.Task`1"/> that represents the asynchronous operation. The value of TResult is the raw <see cref="T:Best.HTTP.HTTPResponse"/>.
  31931. If the request completes successfully, the task will return the HTTPResponse. If there's an error during the request or if
  31932. the request gets canceled, the task will throw an exception, which can be caught and processed by the calling method.
  31933. </returns>
  31934. <exception cref="T:Best.HTTP.AsyncHTTPException">Thrown if there's an error in the request or if the server returns an error status code.</exception>
  31935. </member>
  31936. <member name="M:Best.HTTP.HTTPRequestAsyncExtensions.GetAsStringAsync(Best.HTTP.HTTPRequest,System.Threading.CancellationToken)">
  31937. <summary>
  31938. Asynchronously sends an <see cref="T:Best.HTTP.HTTPRequest"/> and retrieves the response content as a <c>string</c>.
  31939. </summary>
  31940. <param name="request">The <see cref="T:Best.HTTP.HTTPRequest"/> to send.</param>
  31941. <param name="token">A cancellation token that can be used to cancel the operation.</param>
  31942. <returns>
  31943. A Task that represents the asynchronous operation. The Task will complete with the retrieved <c>string</c> content
  31944. if the request succeeds. If the request fails or is canceled, the Task will complete with an exception.
  31945. </returns>
  31946. </member>
  31947. <member name="M:Best.HTTP.HTTPRequestAsyncExtensions.GetAsTexture2DAsync(Best.HTTP.HTTPRequest,System.Threading.CancellationToken)">
  31948. <summary>
  31949. Asynchronously sends an <see cref="T:Best.HTTP.HTTPRequest"/> and retrieves the response content as a <see cref="T:UnityEngine.Texture2D"/>.
  31950. </summary>
  31951. <param name="request">The <see cref="T:Best.HTTP.HTTPRequest"/> to send.</param>
  31952. <param name="token">A cancellation token that can be used to cancel the operation.</param>
  31953. <returns>
  31954. A Task that represents the asynchronous operation. The Task will complete with the retrieved <see cref="T:UnityEngine.Texture2D"/>
  31955. if the request succeeds. If the request fails or is canceled, the Task will complete with an exception.
  31956. </returns>
  31957. </member>
  31958. <member name="M:Best.HTTP.HTTPRequestAsyncExtensions.GetRawDataAsync(Best.HTTP.HTTPRequest,System.Threading.CancellationToken)">
  31959. <summary>
  31960. Asynchronously sends an <see cref="T:Best.HTTP.HTTPRequest"/> and retrieves the response content as a <c>byte[]</c>.
  31961. </summary>
  31962. <param name="request">The <see cref="T:Best.HTTP.HTTPRequest"/> to send.</param>
  31963. <param name="token">A cancellation token that can be used to cancel the operation.</param>
  31964. <returns>
  31965. A Task that represents the asynchronous operation. The Task will complete with the retrieved <c>byte[]</c>
  31966. if the request succeeds. If the request fails or is canceled, the Task will complete with an exception.
  31967. </returns>
  31968. </member>
  31969. <member name="M:Best.HTTP.HTTPRequestAsyncExtensions.GetFromJsonResultAsync``1(Best.HTTP.HTTPRequest,System.Threading.CancellationToken)">
  31970. <summary>
  31971. Asynchronously sends an <see cref="T:Best.HTTP.HTTPRequest"/> and deserializes the response content into an object of type T using JSON deserialization.
  31972. </summary>
  31973. <typeparam name="T">The type to deserialize the JSON content into.</typeparam>
  31974. <param name="request">The <see cref="T:Best.HTTP.HTTPRequest"/> to send.</param>
  31975. <param name="token">A cancellation token that can be used to cancel the operation.</param>
  31976. <returns>
  31977. A Task that represents the asynchronous operation. The Task will complete with the deserialized object
  31978. if the request succeeds and the response content can be deserialized. If the request fails, is canceled, or
  31979. the response cannot be deserialized, the Task will complete with an exception.
  31980. </returns>
  31981. </member>
  31982. <member name="T:Best.HTTP.HTTPRequestStates">
  31983. <summary>
  31984. Possible logical states of a HTTTPRequest object.
  31985. </summary>
  31986. </member>
  31987. <member name="F:Best.HTTP.HTTPRequestStates.Initial">
  31988. <summary>
  31989. Initial status of a request. No callback will be called with this status.
  31990. </summary>
  31991. </member>
  31992. <member name="F:Best.HTTP.HTTPRequestStates.Queued">
  31993. <summary>
  31994. The request queued for processing.
  31995. </summary>
  31996. </member>
  31997. <member name="F:Best.HTTP.HTTPRequestStates.Processing">
  31998. <summary>
  31999. Processing of the request started. In this state the client will send the request, and parse the response. No callback will be called with this status.
  32000. </summary>
  32001. </member>
  32002. <member name="F:Best.HTTP.HTTPRequestStates.Finished">
  32003. <summary>
  32004. The request finished without problem. Parsing the response done, the result can be used. The user defined callback will be called with a valid response object. The request’s Exception property will be null.
  32005. </summary>
  32006. </member>
  32007. <member name="F:Best.HTTP.HTTPRequestStates.Error">
  32008. <summary>
  32009. The request finished with an unexpected error. The user defined callback will be called with a null response object. The request's Exception property may contain more info about the error, but it can be null.
  32010. </summary>
  32011. </member>
  32012. <member name="F:Best.HTTP.HTTPRequestStates.Aborted">
  32013. <summary>
  32014. The request aborted by the client(HTTPRequest’s Abort() function). The user defined callback will be called with a null response. The request’s Exception property will be null.
  32015. </summary>
  32016. </member>
  32017. <member name="F:Best.HTTP.HTTPRequestStates.ConnectionTimedOut">
  32018. <summary>
  32019. Connecting to the server timed out. The user defined callback will be called with a null response. The request’s Exception property will be null.
  32020. </summary>
  32021. </member>
  32022. <member name="F:Best.HTTP.HTTPRequestStates.TimedOut">
  32023. <summary>
  32024. The request didn't finished in the given time. The user defined callback will be called with a null response. The request’s Exception property will be null.
  32025. </summary>
  32026. </member>
  32027. <member name="T:Best.HTTP.Proxies.Autodetect.EnvironmentProxyDetector">
  32028. <summary>
  32029. Based on <see href="https://curl.se/docs/manual.html"/>'s "Environment Variables" section.
  32030. </summary>
  32031. </member>
  32032. <member name="T:Best.HTTP.Proxies.Autodetect.FrameworkProxyDetector">
  32033. <summary>
  32034. This is a detector using the .net framework's implementation. It might work not just under Windows but MacOS and Linux too.
  32035. </summary>
  32036. <remarks>
  32037. More details can be found here:
  32038. <list type="bullet">
  32039. <item><description><see href="https://docs.microsoft.com/en-us/dotnet/api/system.net.http.httpclient.defaultproxy?view=net-6.0">HttpClient.DefaultProxy Property</see></description></item>
  32040. </list>
  32041. </remarks>
  32042. </member>
  32043. <member name="T:Best.HTTP.Proxies.Autodetect.ProgrammaticallyAddedProxyDetector">
  32044. <summary>
  32045. This one just returns with HTTPManager.Proxy,
  32046. so when ProgrammaticallyAddedProxyDetector is used in the first place for the ProxyDetector,
  32047. HTTPManager.Proxy gets the highest priority.
  32048. </summary>
  32049. </member>
  32050. <member name="T:Best.HTTP.Proxies.Autodetect.IProxyDetector">
  32051. <summary>
  32052. Interface for custom proxy-detection logic.
  32053. </summary>
  32054. </member>
  32055. <member name="M:Best.HTTP.Proxies.Autodetect.IProxyDetector.GetProxy(Best.HTTP.HTTPRequest)">
  32056. <summary>
  32057. Receives the <see cref="T:Best.HTTP.HTTPRequest"/> instance this detector has to try to find a proxy.
  32058. </summary>
  32059. <param name="request"><see cref="T:Best.HTTP.HTTPRequest"/>instance to find a proxy for</param>
  32060. <returns>A concrete <see cref="T:Best.HTTP.Proxies.Proxy"/> implementation, or <c>null</c> if no proxy could be found.</returns>
  32061. </member>
  32062. <member name="T:Best.HTTP.Proxies.Autodetect.ProxyDetectionMode">
  32063. <summary>
  32064. Possible detection modes the <see cref="T:Best.HTTP.Proxies.Autodetect.ProxyDetector"/> can be in.
  32065. </summary>
  32066. </member>
  32067. <member name="F:Best.HTTP.Proxies.Autodetect.ProxyDetectionMode.Continuous">
  32068. <summary>
  32069. In Continuous mode the ProxyDetector will check for a proxy for every request.
  32070. </summary>
  32071. </member>
  32072. <member name="F:Best.HTTP.Proxies.Autodetect.ProxyDetectionMode.CacheFirstFound">
  32073. <summary>
  32074. This mode will cache the first Proxy found and use it for consecutive requests.
  32075. </summary>
  32076. </member>
  32077. <member name="T:Best.HTTP.Proxies.Autodetect.ProxyDetector">
  32078. <summary>
  32079. Helper class to contain, manage and execute logic to detect available proxy on the network. It's a wrapper class to execute the various <see cref="T:Best.HTTP.Proxies.Autodetect.IProxyDetector"/>s.
  32080. </summary>
  32081. </member>
  32082. <member name="M:Best.HTTP.Proxies.Autodetect.ProxyDetector.Detach">
  32083. <summary>
  32084. Call Detach() to disable ProxyDetector's logic to find and set a proxy.
  32085. </summary>
  32086. </member>
  32087. <member name="T:Best.HTTP.Proxies.HTTPProxy">
  32088. <summary>
  32089. Represents an HTTP proxy server that can be used to route HTTP requests through.
  32090. </summary>
  32091. <remarks>
  32092. The HTTPProxy class is an implementation of the <see cref="T:Best.HTTP.Proxies.Proxy"/> base class, specifically designed for
  32093. HTTP proxy servers. It provides features such as transparent proxy support, sending the entire URI, and handling proxy
  32094. authentication. This class is used to configure and manage HTTP proxy settings for HTTP requests.
  32095. </remarks>
  32096. </member>
  32097. <member name="P:Best.HTTP.Proxies.HTTPProxy.IsTransparent">
  32098. <summary>
  32099. Gets or sets whether the proxy can act as a transparent proxy. Default value is <c>true</c>.
  32100. </summary>
  32101. <remarks>
  32102. A transparent proxy forwards client requests without modifying them. When set to <c>true</c>, the proxy behaves as a transparent
  32103. proxy, meaning it forwards requests as-is. If set to <c>false</c>, it may modify requests, and this can be useful for certain
  32104. advanced proxy configurations.
  32105. </remarks>
  32106. </member>
  32107. <member name="P:Best.HTTP.Proxies.HTTPProxy.SendWholeUri">
  32108. <summary>
  32109. Gets or sets whether the proxy - when it's in non-transparent mode - excepts only the path and query of the request URI. Default value is <c>true</c>.
  32110. </summary>
  32111. </member>
  32112. <member name="P:Best.HTTP.Proxies.HTTPProxy.NonTransparentForHTTPS">
  32113. <summary>
  32114. Gets or sets whether the plugin will use the proxy as an explicit proxy for secure protocols (HTTPS://, WSS://).
  32115. </summary>
  32116. <remarks>
  32117. When set to <c>true</c>, the plugin will issue a CONNECT request to the proxy for secure protocols, even if the proxy is
  32118. marked as transparent. This is commonly used for ensuring proper handling of encrypted traffic through the proxy.
  32119. </remarks>
  32120. </member>
  32121. <member name="M:Best.HTTP.Proxies.HTTPProxy.#ctor(System.Uri)">
  32122. <summary>
  32123. Creates a new instance of the HTTPProxy class with the specified proxy address.
  32124. </summary>
  32125. <param name="address">The address of the proxy server.</param>
  32126. </member>
  32127. <member name="M:Best.HTTP.Proxies.HTTPProxy.#ctor(System.Uri,Best.HTTP.Request.Authentication.Credentials)">
  32128. <summary>
  32129. Creates a new instance of the HTTPProxy class with the specified proxy address and credentials.
  32130. </summary>
  32131. <param name="address">The address of the proxy server.</param>
  32132. <param name="credentials">The credentials for proxy authentication.</param>
  32133. </member>
  32134. <member name="M:Best.HTTP.Proxies.HTTPProxy.#ctor(System.Uri,Best.HTTP.Request.Authentication.Credentials,System.Boolean)">
  32135. <summary>
  32136. Creates a new instance of the HTTPProxy class with the specified proxy address, credentials, and transparency settings.
  32137. </summary>
  32138. <param name="address">The address of the proxy server.</param>
  32139. <param name="credentials">The credentials for proxy authentication.</param>
  32140. <param name="isTransparent">Specifies whether the proxy can act as a transparent proxy (<c>true</c>) or not (<c>false</c>).</param>
  32141. </member>
  32142. <member name="M:Best.HTTP.Proxies.HTTPProxy.#ctor(System.Uri,Best.HTTP.Request.Authentication.Credentials,System.Boolean,System.Boolean)">
  32143. <summary>
  32144. Creates a new instance of the HTTPProxy class with the specified proxy address, credentials, transparency settings, and URI handling.
  32145. </summary>
  32146. <param name="address">The address of the proxy server.</param>
  32147. <param name="credentials">The credentials for proxy authentication.</param>
  32148. <param name="isTransparent">Specifies whether the proxy can act as a transparent proxy (<c>true</c>) or not (<c>false</c>).</param>
  32149. <param name="sendWholeUri">Specifies whether the proxy should send the entire URI (<c>true</c>) or just the path and query (<c>false</c>) for non-transparent proxies.</param>
  32150. </member>
  32151. <member name="M:Best.HTTP.Proxies.HTTPProxy.#ctor(System.Uri,Best.HTTP.Request.Authentication.Credentials,System.Boolean,System.Boolean,System.Boolean)">
  32152. <summary>
  32153. Creates a new instance of the <see cref="T:Best.HTTP.Proxies.HTTPProxy"/> class with the specified proxy address, credentials, transparency settings, URI handling, and HTTPS behavior.
  32154. </summary>
  32155. <param name="address">The address of the proxy server.</param>
  32156. <param name="credentials">The credentials for proxy authentication.</param>
  32157. <param name="isTransparent">Specifies whether the proxy can act as a transparent proxy (<c>true</c>) or not (<c>false</c>).</param>
  32158. <param name="sendWholeUri">Specifies whether the proxy should send the entire URI (<c>true</c>) or just the path and query (<c>false</c>) for non-transparent proxies.</param>
  32159. <param name="nonTransparentForHTTPS">Specifies whether the plugin should use the proxy as an explicit proxy for secure protocols (HTTPS://, WSS://) (<c>true</c>) or not (<c>false</c>).</param>
  32160. </member>
  32161. <member name="T:Best.HTTP.Proxies.Implementations.SOCKSMethods">
  32162. <summary>
  32163. https://tools.ietf.org/html/rfc1928
  32164. The values currently defined for METHOD are:
  32165. o X'00' NO AUTHENTICATION REQUIRED
  32166. o X'01' GSSAPI
  32167. o X'02' USERNAME/PASSWORD
  32168. o X'03' to X'7F' IANA ASSIGNED
  32169. o X'80' to X'FE' RESERVED FOR PRIVATE METHODS
  32170. o X'FF' NO ACCEPTABLE METHODS
  32171. </summary>
  32172. </member>
  32173. <member name="T:Best.HTTP.Proxies.ProxyConnectParameters">
  32174. <summary>
  32175. Represents parameters used when connecting through a proxy server.
  32176. </summary>
  32177. <remarks>
  32178. The ProxyConnectParameters struct defines the parameters required when initiating a connection
  32179. through a proxy server. It includes information about the proxy, target URI, and callbacks for success and error handling.
  32180. This struct is commonly used during the negotiation steps in the <see cref="T:Best.HTTP.Shared.PlatformSupport.Network.Tcp.Negotiator"/> class.
  32181. </remarks>
  32182. </member>
  32183. <member name="F:Best.HTTP.Proxies.ProxyConnectParameters.MaxAuthenticationAttempts">
  32184. <summary>
  32185. The maximum number of authentication attempts allowed during proxy connection.
  32186. </summary>
  32187. </member>
  32188. <member name="F:Best.HTTP.Proxies.ProxyConnectParameters.proxy">
  32189. <summary>
  32190. The proxy server through which the connection is established.
  32191. </summary>
  32192. </member>
  32193. <member name="F:Best.HTTP.Proxies.ProxyConnectParameters.stream">
  32194. <summary>
  32195. The stream used for communication with the proxy server.
  32196. </summary>
  32197. </member>
  32198. <member name="F:Best.HTTP.Proxies.ProxyConnectParameters.uri">
  32199. <summary>
  32200. The target URI to reach through the proxy server.
  32201. </summary>
  32202. </member>
  32203. <member name="F:Best.HTTP.Proxies.ProxyConnectParameters.token">
  32204. <summary>
  32205. A cancellation token that allows canceling the proxy connection operation.
  32206. </summary>
  32207. </member>
  32208. <member name="F:Best.HTTP.Proxies.ProxyConnectParameters.AuthenticationAttempts">
  32209. <summary>
  32210. The number of authentication attempts made during proxy connection.
  32211. </summary>
  32212. </member>
  32213. <member name="F:Best.HTTP.Proxies.ProxyConnectParameters.createTunel">
  32214. <summary>
  32215. Gets or sets a value indicating whether to create a proxy tunnel.
  32216. </summary>
  32217. <remarks>
  32218. A proxy tunnel, also known as a TCP tunnel, is established when communication between the client and the target server
  32219. needs to be relayed through the proxy without modification. Setting this field to <c>true</c> indicates the intention
  32220. to create a tunnel, allowing the data to pass through the proxy without interpretation or alteration by the proxy.
  32221. This is typically used for protocols like HTTPS, where end-to-end encryption is desired, and the proxy should act as a
  32222. pass-through conduit.
  32223. </remarks>
  32224. </member>
  32225. <member name="F:Best.HTTP.Proxies.ProxyConnectParameters.context">
  32226. <summary>
  32227. The logging context for debugging purposes.
  32228. </summary>
  32229. </member>
  32230. <member name="F:Best.HTTP.Proxies.ProxyConnectParameters.OnSuccess">
  32231. <summary>
  32232. A callback to be executed upon successful proxy connection.
  32233. </summary>
  32234. </member>
  32235. <member name="F:Best.HTTP.Proxies.ProxyConnectParameters.OnError">
  32236. <summary>
  32237. A callback to be executed upon encountering an error during proxy connection.
  32238. </summary>
  32239. <remarks>
  32240. The callback includes parameters for the current connection parameters, the encountered exception,
  32241. and a flag indicating whether the connection should be retried for authentication.
  32242. </remarks>
  32243. </member>
  32244. <member name="T:Best.HTTP.Proxies.Proxy">
  32245. <summary>
  32246. Base class for proxy implementations, providing common proxy configuration and behavior.
  32247. </summary>
  32248. <remarks>
  32249. The Proxy class serves as the base class for various proxy client implementations,
  32250. such as <see cref="T:Best.HTTP.Proxies.HTTPProxy"/> and <see cref="T:Best.HTTP.Proxies.SOCKSProxy"/>. It provides a foundation for configuring proxy settings and handling
  32251. proxy-related functionality common to all proxy types, like connecting to a proxy, setting up a request to go through the proxy
  32252. and deciding whether an address is usable with the proxy or the plugin must connect directly.
  32253. </remarks>
  32254. </member>
  32255. <member name="P:Best.HTTP.Proxies.Proxy.Address">
  32256. <summary>
  32257. Address of the proxy server. It has to be in the http://proxyaddress:port form.
  32258. </summary>
  32259. </member>
  32260. <member name="P:Best.HTTP.Proxies.Proxy.Credentials">
  32261. <summary>
  32262. Credentials for authenticating with the proxy server.
  32263. </summary>
  32264. </member>
  32265. <member name="P:Best.HTTP.Proxies.Proxy.Exceptions">
  32266. <summary>
  32267. List of exceptions for which the proxy should not be used. Elements of this list are compared to the Host (DNS or IP address) part of the uri.
  32268. </summary>
  32269. </member>
  32270. <member name="M:Best.HTTP.Proxies.Proxy.#ctor(System.Uri,Best.HTTP.Request.Authentication.Credentials)">
  32271. <summary>
  32272. Initializes a new instance of the Proxy class with the specified proxy address and credentials.
  32273. </summary>
  32274. <param name="address">The address of the proxy server.</param>
  32275. <param name="credentials">The credentials for proxy authentication.</param>
  32276. </member>
  32277. <member name="M:Best.HTTP.Proxies.Proxy.BeginConnect(Best.HTTP.Proxies.ProxyConnectParameters)">
  32278. <summary>
  32279. Initiates a connection through the proxy server. Used during the negotiation steps.
  32280. </summary>
  32281. <param name="parameters">Parameters for the proxy connection.</param>
  32282. </member>
  32283. <member name="M:Best.HTTP.Proxies.Proxy.GetRequestPath(System.Uri)">
  32284. <summary>
  32285. Gets the request path to be used for proxy communication. In some cases with HTTPProxy, the request must send the whole uri as the request path.
  32286. </summary>
  32287. <param name="uri">The target URI.</param>
  32288. <returns>The request path for proxy communication.</returns>
  32289. </member>
  32290. <member name="M:Best.HTTP.Proxies.Proxy.SetupRequest(Best.HTTP.HTTPRequest)">
  32291. <summary>
  32292. Sets up an HTTP request to use the proxy as needed.
  32293. </summary>
  32294. <param name="request">The HTTP request to set up.</param>
  32295. <returns><c>true</c> if the request should use the proxy; otherwise, <c>false</c>.</returns>
  32296. </member>
  32297. <member name="M:Best.HTTP.Proxies.Proxy.UseProxyForAddress(System.Uri)">
  32298. <summary>
  32299. Determines whether the proxy should be used for a specific address based on the configured exceptions.
  32300. </summary>
  32301. <param name="address">The address to check for proxy usage.</param>
  32302. <returns><c>true</c> if the proxy should be used for the address; otherwise, <c>false</c>.</returns>
  32303. </member>
  32304. <member name="T:Best.HTTP.Proxies.SOCKSProxy">
  32305. <summary>
  32306. Represents a SOCKS proxy used for making HTTP requests, supporting SOCKS version 5 (v5).
  32307. </summary>
  32308. </member>
  32309. <member name="M:Best.HTTP.Proxies.SOCKSProxy.#ctor(System.Uri,Best.HTTP.Request.Authentication.Credentials)">
  32310. <summary>
  32311. Initializes a new instance of the SOCKSProxy class with the specified proxy address and credentials.
  32312. </summary>
  32313. <param name="address">The address of the SOCKS proxy server.</param>
  32314. <param name="credentials">The credentials for proxy authentication (if required).</param>
  32315. </member>
  32316. <member name="T:Best.HTTP.Request.Authentication.AuthenticationTypes">
  32317. <summary>
  32318. Authentication types that supported by Best.HTTP.
  32319. The authentication is defined by the server, so the Basic and Digest are not interchangeable. If you don't know what to use, the preferred way is to choose Unknow.
  32320. </summary>
  32321. </member>
  32322. <member name="F:Best.HTTP.Request.Authentication.AuthenticationTypes.Unknown">
  32323. <summary>
  32324. If the authentication type is not known this will do a challenge turn to receive what methode should be choosen.
  32325. </summary>
  32326. </member>
  32327. <member name="F:Best.HTTP.Request.Authentication.AuthenticationTypes.Basic">
  32328. <summary>
  32329. The most basic authentication type. It's easy to do, and easy to crack, don't use it with plain http://
  32330. </summary>
  32331. </member>
  32332. <member name="F:Best.HTTP.Request.Authentication.AuthenticationTypes.Digest">
  32333. <summary>
  32334. HTTP Digest authentication
  32335. </summary>
  32336. </member>
  32337. <member name="T:Best.HTTP.Request.Authentication.Credentials">
  32338. <summary>
  32339. Hold all information that required to authenticate to a remote server.
  32340. </summary>
  32341. </member>
  32342. <member name="P:Best.HTTP.Request.Authentication.Credentials.Type">
  32343. <summary>
  32344. The type of the Authentication. If you don't know what to use, the preferred way is to choose Unknow.
  32345. </summary>
  32346. </member>
  32347. <member name="P:Best.HTTP.Request.Authentication.Credentials.UserName">
  32348. <summary>
  32349. The username to authenticate on the remote server.
  32350. </summary>
  32351. </member>
  32352. <member name="P:Best.HTTP.Request.Authentication.Credentials.Password">
  32353. <summary>
  32354. The password to use in the authentication process. The password will be stored only in this class.
  32355. </summary>
  32356. </member>
  32357. <member name="M:Best.HTTP.Request.Authentication.Credentials.#ctor(System.String,System.String)">
  32358. <summary>
  32359. Set up the authentication credentials with the username and password. The Type will be set to Unknown.
  32360. </summary>
  32361. </member>
  32362. <member name="M:Best.HTTP.Request.Authentication.Credentials.#ctor(Best.HTTP.Request.Authentication.AuthenticationTypes,System.String,System.String)">
  32363. <summary>
  32364. Set up the authentication credentials with the given authentication type, username and password.
  32365. </summary>
  32366. </member>
  32367. <member name="T:Best.HTTP.Request.Authentication.Digest">
  32368. <summary>
  32369. Internal class that stores all information that received from a server in a WWW-Authenticate and need to construct a valid Authorization header. Based on rfc 2617 (http://tools.ietf.org/html/rfc2617).
  32370. Used only internally by the plugin.
  32371. </summary>
  32372. </member>
  32373. <member name="P:Best.HTTP.Request.Authentication.Digest.Uri">
  32374. <summary>
  32375. The Uri that this Digest is bound to.
  32376. </summary>
  32377. </member>
  32378. <member name="P:Best.HTTP.Request.Authentication.Digest.Realm">
  32379. <summary>
  32380. A string to be displayed to users so they know which username and password to use.
  32381. This string should contain at least the name of the host performing the authentication and might additionally indicate the collection of users who might have access.
  32382. </summary>
  32383. </member>
  32384. <member name="P:Best.HTTP.Request.Authentication.Digest.Stale">
  32385. <summary>
  32386. A flag, indicating that the previous request from the client was rejected because the nonce value was stale.
  32387. If stale is TRUE (case-insensitive), the client may wish to simply retry the request with a new encrypted response, without the user for a new username and password.
  32388. The server should only set stale to TRUE if it receives a request for which the nonce is invalid but with a valid digest for that nonce
  32389. (indicating that the client knows the correct username/password).
  32390. If stale is FALSE, or anything other than TRUE, or the stale directive is not present, the username and/or password are invalid, and new values must be obtained.
  32391. </summary>
  32392. </member>
  32393. <member name="P:Best.HTTP.Request.Authentication.Digest.Nonce">
  32394. <summary>
  32395. A server-specified data string which should be uniquely generated each time a 401 response is made.
  32396. Specifically, since the string is passed in the header lines as a quoted string, the double-quote character is not allowed.
  32397. </summary>
  32398. </member>
  32399. <member name="P:Best.HTTP.Request.Authentication.Digest.Opaque">
  32400. <summary>
  32401. A string of data, specified by the server, which should be returned by the client unchanged in the Authorization header of subsequent requests with URIs in the same protection space.
  32402. It is recommended that this string be base64 or data.
  32403. </summary>
  32404. </member>
  32405. <member name="P:Best.HTTP.Request.Authentication.Digest.Algorithm">
  32406. <summary>
  32407. A string indicating a pair of algorithms used to produce the digest and a checksum. If this is not present it is assumed to be "MD5".
  32408. If the algorithm is not understood, the challenge should be ignored (and a different one used, if there is more than one).
  32409. </summary>
  32410. </member>
  32411. <member name="P:Best.HTTP.Request.Authentication.Digest.ProtectedUris">
  32412. <summary>
  32413. List of URIs, as specified in RFC XURI, that define the protection space.
  32414. If a URI is an abs_path, it is relative to the canonical root URL (see section 1.2 above) of the server being accessed.
  32415. An absoluteURI in this list may refer to a different server than the one being accessed.
  32416. The client can use this list to determine the set of URIs for which the same authentication information may be sent:
  32417. any URI that has a URI in this list as a prefix (after both have been made absolute) may be assumed to be in the same protection space.
  32418. If this directive is omitted or its value is empty, the client should assume that the protection space consists of all URIs on the responding server.
  32419. </summary>
  32420. </member>
  32421. <member name="P:Best.HTTP.Request.Authentication.Digest.QualityOfProtections">
  32422. <summary>
  32423. If present, it is a quoted string of one or more tokens indicating the "quality of protection" values supported by the server.
  32424. The value "auth" indicates authentication. The value "auth-int" indicates authentication with integrity protection.
  32425. </summary>
  32426. </member>
  32427. <member name="P:Best.HTTP.Request.Authentication.Digest.NonceCount">
  32428. <summary>
  32429. his MUST be specified if a qop directive is sent (see above), and MUST NOT be specified if the server did not send a qop directive in the WWW-Authenticate header field.
  32430. The nc-value is the hexadecimal count of the number of requests (including the current request) that the client has sent with the nonce value in this request.
  32431. </summary>
  32432. </member>
  32433. <member name="P:Best.HTTP.Request.Authentication.Digest.HA1Sess">
  32434. <summary>
  32435. Used to store the last HA1 that can be used in the next header generation when Algorithm is set to "md5-sess".
  32436. </summary>
  32437. </member>
  32438. <member name="M:Best.HTTP.Request.Authentication.Digest.ParseChallange(System.String)">
  32439. <summary>
  32440. Parses a WWW-Authenticate header's value to retrive all information.
  32441. </summary>
  32442. </member>
  32443. <member name="M:Best.HTTP.Request.Authentication.Digest.GenerateResponseHeader(Best.HTTP.Request.Authentication.Credentials,System.Boolean,Best.HTTP.HTTPMethods,System.Uri)">
  32444. <summary>
  32445. Generates a string that can be set to an Authorization header.
  32446. </summary>
  32447. </member>
  32448. <member name="T:Best.HTTP.Request.Authentication.DigestStore">
  32449. <summary>
  32450. Stores and manages already received digest infos.
  32451. </summary>
  32452. </member>
  32453. <member name="F:Best.HTTP.Request.Authentication.DigestStore.SupportedAlgorithms">
  32454. <summary>
  32455. Array of algorithms that the plugin supports. It's in the order of priority(first has the highest priority).
  32456. </summary>
  32457. </member>
  32458. <member name="M:Best.HTTP.Request.Authentication.DigestStore.GetOrCreate(System.Uri)">
  32459. <summary>
  32460. It will retrieve or create a new Digest for the given Uri.
  32461. </summary>
  32462. <param name="uri"></param>
  32463. <returns></returns>
  32464. </member>
  32465. <member name="T:Best.HTTP.Request.Authentication.WWWAuthenticateHeaderParser">
  32466. <summary>
  32467. Used for parsing WWW-Authenticate headers:
  32468. `Digest realm="my realm", nonce="4664b327a2963503ba58bbe13ad672c0", qop=auth, opaque="f7e38bdc1c66fce214f9019ffe43117c"`
  32469. </summary>
  32470. </member>
  32471. <member name="T:Best.HTTP.Request.Authenticators.BearerTokenAuthenticator">
  32472. <summary>
  32473. An <see cref="T:Best.HTTP.Request.Authenticators.IAuthenticator"/> implementation for Bearer Token authentication.
  32474. </summary>
  32475. <remarks>
  32476. Bearer Token authentication is a method used to access protected resources on a server.
  32477. It involves including a bearer token in the Authorization header of an HTTP request to prove the identity of the requester.
  32478. </remarks>
  32479. </member>
  32480. <member name="P:Best.HTTP.Request.Authenticators.BearerTokenAuthenticator.Token">
  32481. <summary>
  32482. Initializes a new instance of the BearerTokenAuthenticator class with the specified Bearer Token.
  32483. </summary>
  32484. <param name="token">The Bearer Token to use for authentication.</param>
  32485. </member>
  32486. <member name="M:Best.HTTP.Request.Authenticators.BearerTokenAuthenticator.#ctor(System.String)">
  32487. <summary>
  32488. Sets up the required Authorization header with the Bearer Token for the HTTP request.
  32489. </summary>
  32490. <param name="request">The HTTP request for which the Authorization header should be added.</param>
  32491. <remarks>
  32492. When sending an HTTP request to a server that requires Bearer Token authentication,
  32493. this method sets the Authorization header with the Bearer Token to prove the identity of the requester.
  32494. This allows the requester to access protected resources on the server.
  32495. </remarks>
  32496. </member>
  32497. <member name="M:Best.HTTP.Request.Authenticators.BearerTokenAuthenticator.HandleChallange(Best.HTTP.HTTPRequest,Best.HTTP.HTTPResponse)">
  32498. <summary>
  32499. Handles the server response with a 401 (Unauthorized) status code and a WWW-Authenticate header.
  32500. This authenticator does not handle challenges and always returns <c>false</c>.
  32501. </summary>
  32502. <param name="req">The HTTP request that received the 401 response.</param>
  32503. <param name="resp">The HTTP response containing the 401 (Unauthorized) status.</param>
  32504. <returns><c>false</c>, as this authenticator does not handle challenges.</returns>
  32505. <remarks>
  32506. Bearer Token authentication typically does not require handling challenges,
  32507. as the Bearer Token is included directly in the Authorization header of the request.
  32508. This method always returns <c>false</c>, as no additional challenge processing is needed.
  32509. </remarks>
  32510. </member>
  32511. <member name="T:Best.HTTP.Request.Authenticators.CredentialAuthenticator">
  32512. <summary>
  32513. An <see cref="T:Best.HTTP.Request.Authenticators.IAuthenticator"/> implementation for HTTP Basic or Digest authentication.
  32514. </summary>
  32515. </member>
  32516. <member name="P:Best.HTTP.Request.Authenticators.CredentialAuthenticator.Credentials">
  32517. <summary>
  32518. Gets or sets the <see cref="T:Best.HTTP.Request.Authentication.Credentials"/> associated with this authenticator.
  32519. </summary>
  32520. </member>
  32521. <member name="M:Best.HTTP.Request.Authenticators.CredentialAuthenticator.#ctor(Best.HTTP.Request.Authentication.Credentials)">
  32522. <summary>
  32523. Initializes a new instance of the CrendetialAuthenticator class with the specified <see cref="T:Best.HTTP.Request.Authentication.Credentials"/>.
  32524. </summary>
  32525. <param name="credentials">The <see cref="T:Best.HTTP.Request.Authentication.Credentials"/> to use for authentication.</param>
  32526. <exception cref="T:System.ArgumentNullException">Thrown if <paramref name="credentials"/> is null.</exception>
  32527. </member>
  32528. <member name="M:Best.HTTP.Request.Authenticators.CredentialAuthenticator.SetupRequest(Best.HTTP.HTTPRequest)">
  32529. <summary>
  32530. Sets up the required headers for the HTTP request based on the provided credentials.
  32531. </summary>
  32532. <param name="request">The HTTP request for which headers should be added.</param>
  32533. </member>
  32534. <member name="M:Best.HTTP.Request.Authenticators.CredentialAuthenticator.HandleChallange(Best.HTTP.HTTPRequest,Best.HTTP.HTTPResponse)">
  32535. <summary>
  32536. Handles the server response with a 401 (Unauthorized) status code and a WWW-Authenticate header.
  32537. The authenticator might determine the authentication method to use and initiate authentication if needed.
  32538. </summary>
  32539. <param name="req">The HTTP request that received the 401 response.</param>
  32540. <param name="resp">The HTTP response containing the 401 (Unauthorized) status.</param>
  32541. <returns><c>true</c> if the challenge is handled by the authenticator and the request can be resent with authentication; otherwise, <c>false</c>.</returns>
  32542. </member>
  32543. <member name="T:Best.HTTP.Request.Authenticators.IAuthenticator">
  32544. <summary>
  32545. Represents an interface for various authentication implementations used in HTTP requests.
  32546. </summary>
  32547. </member>
  32548. <member name="M:Best.HTTP.Request.Authenticators.IAuthenticator.SetupRequest(Best.HTTP.HTTPRequest)">
  32549. <summary>
  32550. Set required headers or content for the HTTP request. Called right before the request is sent out.
  32551. </summary>
  32552. <remarks>
  32553. <para>
  32554. The SetupRequest method will be called every time the request is redirected or retried.
  32555. </para>
  32556. </remarks>
  32557. <param name="request">The HTTP request to which headers or content will be added.</param>
  32558. </member>
  32559. <member name="M:Best.HTTP.Request.Authenticators.IAuthenticator.HandleChallange(Best.HTTP.HTTPRequest,Best.HTTP.HTTPResponse)">
  32560. <summary>
  32561. Called when the server is sending a 401 (Unauthorized) response with an WWW-Authenticate header.
  32562. The authenticator might find additional knowledge about the authentication requirements (like what auth method it should use).
  32563. If the authenticator is confident it can successfully (re)authenticate the request it can return true and the request will be resent to the server.
  32564. </summary>
  32565. <remarks>
  32566. More details can be found here:
  32567. <list type="bullet">
  32568. <item><description><see href="https://www.rfc-editor.org/rfc/rfc9110.html#status.401">RFC-9110 - 401 Unauthorized</see></description></item>
  32569. <item><description><see href="https://www.rfc-editor.org/rfc/rfc9110.html#name-www-authenticate">RFC-9110 - WWW-Authenticate header</see></description></item>
  32570. </list>
  32571. </remarks>
  32572. <param name="req">The HTTP request that received the 401 response.</param>
  32573. <param name="resp">The HTTP response containing the 401 (Unauthorized) status.</param>
  32574. <returns><c>true</c> if the challange is handled by the authenticator and the request can be re-sent with authentication.</returns>
  32575. </member>
  32576. <member name="T:Best.HTTP.Request.Settings.OnHeadersReceivedDelegate">
  32577. <summary>
  32578. Delegate for handling the event when headers are received in a response.
  32579. </summary>
  32580. <param name="req">The <see cref="T:Best.HTTP.HTTPRequest"/> object.</param>
  32581. <param name="resp">The <see cref="T:Best.HTTP.HTTPResponse"/> object.</param>
  32582. <param name="headers">The headers received from the server.</param>
  32583. </member>
  32584. <member name="T:Best.HTTP.Request.Settings.OnProgressDelegate">
  32585. <summary>
  32586. Delegate for handling progress during the download.
  32587. </summary>
  32588. <param name="req">The <see cref="T:Best.HTTP.HTTPRequest"/> object.</param>
  32589. <param name="progress">The number of bytes downloaded so far.</param>
  32590. <param name="length">The total length of the content being downloaded, or -1 if the length cannot be determined.</param>
  32591. </member>
  32592. <member name="T:Best.HTTP.Request.Settings.OnDownloadStartedDelegate">
  32593. <summary>
  32594. Delegate for handling the event when the download of content starts.
  32595. </summary>
  32596. <param name="req">The <see cref="T:Best.HTTP.HTTPRequest"/> object.</param>
  32597. <param name="resp">The <see cref="T:Best.HTTP.HTTPResponse"/> object.</param>
  32598. <param name="stream">The <see cref="T:Best.HTTP.Response.DownloadContentStream"/> used for receiving downloaded content.</param>
  32599. </member>
  32600. <member name="T:Best.HTTP.Request.Settings.OnCreateDownloadStreamDelegate">
  32601. <summary>
  32602. Delegate for creating a new <see cref="T:Best.HTTP.Response.DownloadContentStream"/> object.
  32603. </summary>
  32604. <param name="req">The <see cref="T:Best.HTTP.HTTPRequest"/> object.</param>
  32605. <param name="resp">The <see cref="T:Best.HTTP.HTTPResponse"/> object.</param>
  32606. <param name="bufferAvailableHandler">An interface for notifying connections that the buffer has free space for downloading data.</param>
  32607. <returns>The newly created <see cref="T:Best.HTTP.Response.DownloadContentStream"/>.</returns>
  32608. </member>
  32609. <member name="T:Best.HTTP.Request.Settings.OnUpgradedDelegate">
  32610. <summary>
  32611. Delegate for handling the event when a response is upgraded.
  32612. </summary>
  32613. <param name="req">The <see cref="T:Best.HTTP.HTTPRequest"/> object.</param>
  32614. <param name="resp">The <see cref="T:Best.HTTP.HTTPResponse"/> object.</param>
  32615. <param name="contentProvider">A stream that provides content for the upgraded response.</param>
  32616. <returns><c>true</c> to keep the underlying connection open; otherwise, <c>false</c>.</returns>
  32617. </member>
  32618. <member name="T:Best.HTTP.Request.Settings.DownloadSettings">
  32619. <summary>
  32620. Represents settings for configuring an HTTP request's download behavior.
  32621. </summary>
  32622. </member>
  32623. <member name="F:Best.HTTP.Request.Settings.DownloadSettings.ContentStreamMaxBuffered">
  32624. <summary>
  32625. Gets or sets the maximum number of bytes the <see cref="T:Best.HTTP.Response.DownloadContentStream"/> will buffer before pausing the download until its buffer has free space again.
  32626. </summary>
  32627. <remarks>
  32628. When the download content stream buffers data up to this specified limit, it will temporarily pause downloading until it has free space in its buffer.
  32629. Increasing this value may help reduce the frequency of pauses during downloads, but it also increases memory usage.
  32630. </remarks>
  32631. </member>
  32632. <member name="P:Best.HTTP.Request.Settings.DownloadSettings.DisableCache">
  32633. <summary>
  32634. Gets or sets a value indicating whether caching should be enabled for this request.
  32635. </summary>
  32636. </member>
  32637. <member name="P:Best.HTTP.Request.Settings.DownloadSettings.CacheOnly">
  32638. <summary>
  32639. Gets or sets a value indicating whether the response's <see cref="T:Best.HTTP.Response.DownloadContentStream"/> should be populated with downloaded data or if the content should be written only to the local cache when available.
  32640. </summary>
  32641. <remarks>
  32642. If set to <c>true</c> and the content isn't cacheable (e.g., it doesn't have any cache-related headers), the content will be downloaded but will be lost.
  32643. </remarks>
  32644. <summary>
  32645. Gets or sets a value indicating whether the response's <see cref="P:Best.HTTP.HTTPResponse.DownStream"/> should be populated with downloaded data or if the content should be written only to the local cache when available.
  32646. </summary>
  32647. <remarks>
  32648. If set to <c>true</c> and the content isn't cacheable (e.g., it doesn't have any cache-related headers), the content will be downloaded but will be lost.
  32649. This is because the downloaded data would be written exclusively to the local cache and will not be stored in memory or the response's <see cref="P:Best.HTTP.HTTPResponse.DownStream"/> for further use.
  32650. </remarks>
  32651. </member>
  32652. <member name="F:Best.HTTP.Request.Settings.DownloadSettings.OnHeadersReceived">
  32653. <summary>
  32654. This event is called when the plugin received and parsed all headers.
  32655. </summary>
  32656. </member>
  32657. <member name="F:Best.HTTP.Request.Settings.DownloadSettings.DownloadStreamFactory">
  32658. <summary>
  32659. Represents a function that creates a new <see cref="T:Best.HTTP.Response.DownloadContentStream"/> object when needed for downloading content.
  32660. </summary>
  32661. </member>
  32662. <member name="F:Best.HTTP.Request.Settings.DownloadSettings.OnDownloadStarted">
  32663. <summary>
  32664. Event for handling the start of the download process for 2xx status code responses.
  32665. </summary>
  32666. <param name="req">The <see cref="T:Best.HTTP.HTTPRequest"/> object.</param>
  32667. <param name="resp">The <see cref="T:Best.HTTP.HTTPResponse"/> object representing the response.</param>
  32668. <param name="stream">
  32669. The <see cref="T:Best.HTTP.Response.DownloadContentStream"/> containing the downloaded data. It might already be populated with some content.
  32670. </param>
  32671. <remarks>
  32672. This event is called when the plugin expects the server to send content. When called, the <see cref="T:Best.HTTP.Response.DownloadContentStream"/>
  32673. might already be populated with some content. It is specifically meant for responses with 2xx status codes.
  32674. </remarks>
  32675. </member>
  32676. <member name="F:Best.HTTP.Request.Settings.DownloadSettings.OnDownloadProgress">
  32677. <summary>
  32678. Gets or sets the event that is called when new data is downloaded from the server.
  32679. </summary>
  32680. <remarks>
  32681. The first parameter is the original <see cref="T:Best.HTTP.HTTPRequest"/> object itself, the second parameter is the downloaded bytes, and the third parameter is the content length.
  32682. There are download modes where we can't figure out the exact length of the final content. In these cases, we guarantee that the third parameter will be at least the size of the second one.
  32683. </remarks>
  32684. </member>
  32685. <member name="F:Best.HTTP.Request.Settings.DownloadSettings.OnUpgraded">
  32686. <summary>
  32687. Called when a response with status code 101 (upgrade), "<c>connection: upgrade</c>" header and value or an "<c>upgrade</c>" header received.
  32688. </summary>
  32689. <remarks>This callback might be called on a thread other than the main one!</remarks>
  32690. <remarks>Isn't available under WebGL!</remarks>
  32691. </member>
  32692. <member name="T:Best.HTTP.Request.Settings.ProxySettings">
  32693. <summary>
  32694. Represents settings related to using a proxy server for HTTP requests.
  32695. </summary>
  32696. </member>
  32697. <member name="M:Best.HTTP.Request.Settings.ProxySettings.HasProxyFor(System.Uri)">
  32698. <summary>
  32699. Checks if there is a proxy configured for the given URI.
  32700. </summary>
  32701. <param name="uri">The URI to check for proxy usage.</param>
  32702. <returns><c>true</c> if a proxy is configured and should be used for the URI; otherwise, <c>false</c>.</returns>
  32703. </member>
  32704. <member name="P:Best.HTTP.Request.Settings.ProxySettings.Proxy">
  32705. <summary>
  32706. Gets or sets the proxy object used for the request.
  32707. </summary>
  32708. </member>
  32709. <member name="M:Best.HTTP.Request.Settings.ProxySettings.SetupRequest(Best.HTTP.HTTPRequest)">
  32710. <summary>
  32711. Sets up the HTTP request for passing through a proxy server.
  32712. </summary>
  32713. <param name="request">The HTTP request to set up.</param>
  32714. </member>
  32715. <member name="M:Best.HTTP.Request.Settings.ProxySettings.Handle407(Best.HTTP.HTTPRequest)">
  32716. <summary>
  32717. Handles the proxy's response with status code <c>407</c>.
  32718. </summary>
  32719. <param name="request">The HTTP request that received a <c>407</c> response.</param>
  32720. <returns><c>true</c> to resend the request through the proxy; otherwise, <c>false</c>.</returns>
  32721. </member>
  32722. <member name="M:Best.HTTP.Request.Settings.ProxySettings.AddToHash(System.Uri,UnityEngine.Hash128@)">
  32723. <summary>
  32724. Adds the proxy address to a hash for the given request URI.
  32725. </summary>
  32726. <param name="requestUri">The request URI for which the proxy address is added to the hash.</param>
  32727. <param name="hash">The hash to which the proxy address is added.</param>
  32728. </member>
  32729. <member name="T:Best.HTTP.Request.Settings.RedirectSettings">
  32730. <summary>
  32731. Represents settings related to handling HTTP request redirection.
  32732. </summary>
  32733. </member>
  32734. <member name="P:Best.HTTP.Request.Settings.RedirectSettings.IsRedirected">
  32735. <summary>
  32736. Indicates whether the request has been redirected.
  32737. A request's IsRedirected might be true while <see cref="P:Best.HTTP.Request.Settings.RedirectSettings.RedirectCount"/> is zero if the redirection is made to the local cache.
  32738. </summary>
  32739. </member>
  32740. <member name="P:Best.HTTP.Request.Settings.RedirectSettings.RedirectUri">
  32741. <summary>
  32742. The Uri that the request is redirected to.
  32743. </summary>
  32744. </member>
  32745. <member name="P:Best.HTTP.Request.Settings.RedirectSettings.MaxRedirects">
  32746. <summary>
  32747. How many redirection is supported for this request. The default is 10. Zero or a negative value means no redirections are supported.
  32748. </summary>
  32749. <summary>
  32750. Gets or sets the maximum number of redirections supported for this request. The default is <c>10</c>.
  32751. A value of zero or a negative value means no redirections are supported.
  32752. </summary>
  32753. </member>
  32754. <member name="P:Best.HTTP.Request.Settings.RedirectSettings.RedirectCount">
  32755. <summary>
  32756. Gets the number of times the request has been redirected.
  32757. </summary>
  32758. </member>
  32759. <member name="E:Best.HTTP.Request.Settings.RedirectSettings.OnBeforeRedirection">
  32760. <summary>
  32761. Occurs before the plugin makes a new request to the new URI during redirection.
  32762. The return value of this event handler controls whether the redirection is aborted (<c>false</c>) or allowed (<c>true</c>).
  32763. This event is called on a thread other than the main Unity thread.
  32764. </summary>
  32765. </member>
  32766. <member name="M:Best.HTTP.Request.Settings.RedirectSettings.#ctor(System.Int32)">
  32767. <summary>
  32768. Initializes a new instance of the RedirectSettings class with the specified maximum redirections.
  32769. </summary>
  32770. <param name="maxRedirects">The maximum number of redirections allowed.</param>
  32771. </member>
  32772. <member name="M:Best.HTTP.Request.Settings.RedirectSettings.Reset">
  32773. <summary>
  32774. Resets <see cref="P:Best.HTTP.Request.Settings.RedirectSettings.IsRedirected"/> and <see cref="P:Best.HTTP.Request.Settings.RedirectSettings.RedirectCount"/> to their default values.
  32775. </summary>
  32776. </member>
  32777. <member name="T:Best.HTTP.Request.Settings.RetrySettings">
  32778. <summary>
  32779. Represents settings related to request retry behavior.
  32780. </summary>
  32781. </member>
  32782. <member name="P:Best.HTTP.Request.Settings.RetrySettings.Retries">
  32783. <summary>
  32784. Gets the number of times that the plugin has retried the request.
  32785. </summary>
  32786. </member>
  32787. <member name="P:Best.HTTP.Request.Settings.RetrySettings.MaxRetries">
  32788. <summary>
  32789. Gets or sets the maximum number of retry attempts allowed. To disable retries, set this value to <c>0</c>.
  32790. The default value is <c>1</c> for GET requests, otherwise <c>0</c>.
  32791. </summary>
  32792. </member>
  32793. <member name="M:Best.HTTP.Request.Settings.RetrySettings.#ctor(System.Int32)">
  32794. <summary>
  32795. Initializes a new instance of the RetrySettings class with the specified maximum retry attempts.
  32796. </summary>
  32797. <param name="maxRetries">The maximum number of retry attempts allowed.</param>
  32798. </member>
  32799. <member name="T:Best.HTTP.Request.Settings.TimeoutSettings">
  32800. <summary>
  32801. Represents settings related to connection-timeouts and processing duration.
  32802. </summary>
  32803. </member>
  32804. <member name="P:Best.HTTP.Request.Settings.TimeoutSettings.QueuedAt">
  32805. <summary>
  32806. Gets the timestamp when the request was queued for processing.
  32807. </summary>
  32808. </member>
  32809. <member name="P:Best.HTTP.Request.Settings.TimeoutSettings.ProcessingStarted">
  32810. <summary>
  32811. Gets the timestamp when the processing of the request started by a connection.
  32812. </summary>
  32813. </member>
  32814. <member name="P:Best.HTTP.Request.Settings.TimeoutSettings.ConnectTimeout">
  32815. <summary>
  32816. Gets or sets the maximum time to wait for establishing the connection to the target server.
  32817. If set to <c>TimeSpan.Zero</c> or lower, no connect timeout logic is executed. Default value is 20 seconds.
  32818. </summary>
  32819. </member>
  32820. <member name="P:Best.HTTP.Request.Settings.TimeoutSettings.Timeout">
  32821. <summary>
  32822. Gets or sets the maximum time to wait for the request to finish after the connection is established.
  32823. </summary>
  32824. </member>
  32825. <member name="M:Best.HTTP.Request.Settings.TimeoutSettings.IsConnectTimedOut(System.DateTime)">
  32826. <summary>
  32827. Returns <c>true</c> if the request has been stuck in the connection phase for too long.
  32828. </summary>
  32829. <param name="now">The current timestamp.</param>
  32830. <returns><c>true</c> if the connection has timed out; otherwise, <c>false</c>.</returns>
  32831. </member>
  32832. <member name="M:Best.HTTP.Request.Settings.TimeoutSettings.IsTimedOut(System.DateTime)">
  32833. <summary>
  32834. Returns <c>true</c> if the time has passed the specified Timeout setting since processing started or if the connection has timed out.
  32835. </summary>
  32836. <param name="now">The current timestamp.</param>
  32837. <returns><c>true</c> if the request has timed out; otherwise, <c>false</c>.</returns>
  32838. </member>
  32839. <member name="M:Best.HTTP.Request.Settings.TimeoutSettings.#ctor(Best.HTTP.HTTPRequest)">
  32840. <summary>
  32841. Initializes a new instance of the TimeoutSettings class for a specific <see cref="T:Best.HTTP.HTTPRequest"/>.
  32842. </summary>
  32843. <param name="request">The <see cref="T:Best.HTTP.HTTPRequest"/> associated with these timeout settings.</param>
  32844. </member>
  32845. <member name="T:Best.HTTP.Request.Settings.UploadSettings">
  32846. <summary>
  32847. Options for sending the request headers and content, including upload progress monitoring.
  32848. </summary>
  32849. <remarks><see cref="M:Best.HTTP.Request.Settings.UploadSettings.SetupRequest(Best.HTTP.HTTPRequest,System.Boolean)"/> might be called when redirected or retried!</remarks>
  32850. </member>
  32851. <member name="F:Best.HTTP.Request.Settings.UploadSettings.UploadChunkSize">
  32852. <summary>
  32853. Size of the internal buffer, and upload progress will be fired when this size of data sent to the wire. Its default value is 4 KiB.
  32854. </summary>
  32855. </member>
  32856. <member name="F:Best.HTTP.Request.Settings.UploadSettings.UploadStream">
  32857. <summary>
  32858. The stream that the plugin will use to send data to the server.
  32859. </summary>
  32860. <remarks>
  32861. The stream can be any regular <see cref="T:System.IO.Stream"/> implementation or a specialized one inheriting from <see cref="T:Best.HTTP.Request.Upload.UploadStreamBase"/>:
  32862. <list type="bullet">
  32863. <item><term><see cref="T:Best.HTTP.Request.Upload.DynamicUploadStream"/></term><description>A specialized <see cref="T:Best.HTTP.Request.Upload.UploadStreamBase"/> for data generated on-the-fly or periodically. The request remains active until the <see cref="M:Best.HTTP.Request.Upload.DynamicUploadStream.Complete"/> method is invoked, ensuring continuous data feed even during temporary empty states.</description></item>
  32864. <item><term><see cref="T:Best.HTTP.Request.Upload.JSonDataStream`1"/></term><description>An <see cref="T:Best.HTTP.Request.Upload.UploadStreamBase"/> implementation to convert and upload the object as JSON data. It sets the <c>"Content-Type"</c> header to <c>"application/json; charset=utf-8"</c>.</description></item>
  32865. <item><term><see cref="T:Best.HTTP.Request.Upload.Forms.UrlEncodedStream"/></term><description>An <see cref="T:Best.HTTP.Request.Upload.UploadStreamBase"/> implementation representing a stream that prepares and sends data as URL-encoded form data in an HTTP request.</description></item>
  32866. <item><term><see cref="T:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream"/></term><description>An <see cref="T:Best.HTTP.Request.Upload.UploadStreamBase"/> based implementation of the <c>multipart/form-data</c> Content-Type. It's very memory-effective, streams are read into memory in chunks.</description></item>
  32867. </list>
  32868. </remarks>
  32869. </member>
  32870. <member name="F:Best.HTTP.Request.Settings.UploadSettings.DisposeStream">
  32871. <summary>
  32872. Set to <c>false</c> if the plugin MUST NOT dispose <see cref="F:Best.HTTP.Request.Settings.UploadSettings.UploadStream"/> after the request is finished.
  32873. </summary>
  32874. </member>
  32875. <member name="F:Best.HTTP.Request.Settings.UploadSettings.OnUploadProgress">
  32876. <summary>
  32877. Called periodically when data sent to the server.
  32878. </summary>
  32879. </member>
  32880. <member name="E:Best.HTTP.Request.Settings.UploadSettings.OnHeadersSent">
  32881. <summary>
  32882. This event is fired after the headers are sent to the server.
  32883. </summary>
  32884. </member>
  32885. <member name="M:Best.HTTP.Request.Settings.UploadSettings.SetupRequest(Best.HTTP.HTTPRequest,System.Boolean)">
  32886. <summary>
  32887. Called every time the request is sent out (redirected or retried).
  32888. </summary>
  32889. <param name="request">The <see cref="T:Best.HTTP.HTTPRequest"/> being prepared.</param>
  32890. <param name="dispatchHeadersSentCallback"><c>true</c> if the <see cref="E:Best.HTTP.Request.Settings.UploadSettings.OnHeadersSent"/> can be fired.</param>
  32891. </member>
  32892. <member name="M:Best.HTTP.Request.Settings.UploadSettings.Dispose">
  32893. <summary>
  32894. Dispose of resources used by the UploadSettings instance.
  32895. </summary>
  32896. </member>
  32897. <member name="T:Best.HTTP.Request.Timings.TimingCollector">
  32898. <summary>
  32899. Helper class to store, calculate and manage request related events and theirs duration, referenced by <see cref="P:Best.HTTP.HTTPRequest.Timing"/> field.
  32900. </summary>
  32901. </member>
  32902. <member name="P:Best.HTTP.Request.Timings.TimingCollector.Created">
  32903. <summary>
  32904. When the TimingCollector instance created.
  32905. </summary>
  32906. </member>
  32907. <member name="P:Best.HTTP.Request.Timings.TimingCollector.Finished">
  32908. <summary>
  32909. When the closing Finish event is sent.
  32910. </summary>
  32911. </member>
  32912. <member name="P:Best.HTTP.Request.Timings.TimingCollector.Events">
  32913. <summary>
  32914. List of added events.
  32915. </summary>
  32916. </member>
  32917. <member name="M:Best.HTTP.Request.Timings.TimingCollector.Finish">
  32918. <summary>
  32919. Finish the last event.
  32920. </summary>
  32921. </member>
  32922. <member name="M:Best.HTTP.Request.Timings.TimingCollector.Abort">
  32923. <summary>
  32924. Abort the currently running event.
  32925. </summary>
  32926. </member>
  32927. <member name="M:Best.HTTP.Request.Timings.TimingCollector.AddEvent(System.String,System.DateTime,System.TimeSpan)">
  32928. <summary>
  32929. When the event happened and for how long.
  32930. </summary>
  32931. </member>
  32932. <member name="T:Best.HTTP.Request.Timings.TimingEvent">
  32933. <summary>
  32934. Struct to hold information about one timing event recorded for a <see cref="T:Best.HTTP.HTTPRequest"/>. Timing events are managed by the <see cref="T:Best.HTTP.Request.Timings.TimingCollector"/>.
  32935. </summary>
  32936. </member>
  32937. <member name="F:Best.HTTP.Request.Timings.TimingEvent.Name">
  32938. <summary>
  32939. Name of the event
  32940. </summary>
  32941. </member>
  32942. <member name="F:Best.HTTP.Request.Timings.TimingEvent.Duration">
  32943. <summary>
  32944. Duration of the event.
  32945. </summary>
  32946. </member>
  32947. <member name="F:Best.HTTP.Request.Timings.TimingEvent.When">
  32948. <summary>
  32949. When the event occurred.
  32950. </summary>
  32951. </member>
  32952. <member name="T:Best.HTTP.Request.Upload.BodyLengths">
  32953. <summary>
  32954. Provides constants representing different, special body lengths for HTTP requests with upload streams.
  32955. </summary>
  32956. </member>
  32957. <member name="F:Best.HTTP.Request.Upload.BodyLengths.UnknownWithChunkedTransferEncoding">
  32958. <summary>
  32959. The <see cref="T:Best.HTTP.Request.Upload.UploadStreamBase"/>'s length is unknown and the plugin have to send data with '<c>chunked</c>' transfer-encoding.
  32960. </summary>
  32961. </member>
  32962. <member name="F:Best.HTTP.Request.Upload.BodyLengths.UnknownRaw">
  32963. <summary>
  32964. The <see cref="T:Best.HTTP.Request.Upload.UploadStreamBase"/>'s length is unknown and the plugin have to send data as-is, without any encoding.
  32965. </summary>
  32966. </member>
  32967. <member name="F:Best.HTTP.Request.Upload.BodyLengths.NoBody">
  32968. <summary>
  32969. No content to send.
  32970. </summary>
  32971. </member>
  32972. <member name="T:Best.HTTP.Request.Upload.DynamicUploadStream">
  32973. <summary>
  32974. A specialized upload stream designed to handle data that's generated on-the-fly or periodically.
  32975. </summary>
  32976. <remarks>
  32977. This implementation is designed to handle scenarios where data may not always be immediately available for upload.
  32978. The request will remain active until the <see cref="M:Best.HTTP.Request.Upload.DynamicUploadStream.Complete"/> method is invoked, ensuring that data can continue to be fed into the stream even if it's temporarily empty during a Read operation.
  32979. </remarks>
  32980. </member>
  32981. <member name="P:Best.HTTP.Request.Upload.DynamicUploadStream.Length">
  32982. <summary>
  32983. Gets the length of the upload stream.
  32984. </summary>
  32985. <remarks>
  32986. This implementation returns a constant value of <c>-1</c>, indicating that the length of the data to be uploaded is unknown. When the processing connection encounters this value, it should utilize chunked uploading to handle the data transfer.
  32987. </remarks>
  32988. <value>The constant value of <c>-1</c>, representing unknown length.</value>
  32989. </member>
  32990. <member name="P:Best.HTTP.Request.Upload.DynamicUploadStream.BufferedLength">
  32991. <summary>
  32992. Gets the length of data currently buffered and ready for upload.
  32993. </summary>
  32994. <value>The length of buffered data in bytes.</value>
  32995. </member>
  32996. <member name="M:Best.HTTP.Request.Upload.DynamicUploadStream.#ctor(System.String)">
  32997. <summary>
  32998. Initializes a new instance of the DynamicUploadStream class with an optional content type.
  32999. </summary>
  33000. <param name="contentType">The MIME type of the content to be uploaded. Defaults to "<c>application/octet-stream</c>" if not specified.</param>
  33001. <remarks>
  33002. This constructor allows the caller to specify the content type of the data to be uploaded. If not provided, it defaults to a general binary data type.
  33003. </remarks>
  33004. </member>
  33005. <member name="M:Best.HTTP.Request.Upload.DynamicUploadStream.BeforeSendHeaders(Best.HTTP.HTTPRequest)">
  33006. <summary>
  33007. Sets the necessary headers before sending the request.
  33008. </summary>
  33009. </member>
  33010. <member name="M:Best.HTTP.Request.Upload.DynamicUploadStream.BeforeSendBody(Best.HTTP.HTTPRequest,Best.HTTP.Hosts.Connections.IThreadSignaler)">
  33011. <summary>
  33012. Prepares the stream before the request body is sent.
  33013. </summary>
  33014. </member>
  33015. <member name="M:Best.HTTP.Request.Upload.DynamicUploadStream.Read(System.Byte[],System.Int32,System.Int32)">
  33016. <summary>
  33017. Reads data from the stream to be uploaded.
  33018. </summary>
  33019. <remarks>
  33020. The returned value indicates the state of the stream:
  33021. <list type="bullet">
  33022. <item><term>-1</term><description>More data is expected in the future, but isn't currently available. When new data is ready, the IThreadSignaler must be notified.</description></item>
  33023. <item><term>0</term><description>The stream has been closed and no more data will be provided.</description></item>
  33024. <item><description>Otherwise it returns with the number bytes copied to the buffer.</description></item>
  33025. </list>
  33026. Note: A zero return value can come after a -1 return, indicating a transition from waiting to completion.
  33027. </remarks>
  33028. </member>
  33029. <member name="M:Best.HTTP.Request.Upload.DynamicUploadStream.Write(System.Byte[],System.Int32,System.Int32)">
  33030. <summary>
  33031. Writes data to the stream, making it available for upload.
  33032. </summary>
  33033. <remarks>
  33034. After writing data to the stream using this method, the connection is signaled that data is available to send.
  33035. </remarks>
  33036. <param name="buffer">The array of unsigned bytes from which to copy count bytes to the current stream.</param>
  33037. <param name="offset">The zero-based byte offset in buffer at which to begin copying bytes to the current stream.</param>
  33038. <param name="count">The number of bytes to be written to the current stream.</param>
  33039. <exception cref="T:System.InvalidOperationException">Thrown when trying to write after the stream has been marked as complete.</exception>
  33040. </member>
  33041. <member name="M:Best.HTTP.Request.Upload.DynamicUploadStream.Write(Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment)">
  33042. <summary>
  33043. Writes a segment of data to the stream, making it available for upload.
  33044. </summary>
  33045. <param name="segment">A segment of data to be written to the stream.</param>
  33046. <exception cref="T:System.InvalidOperationException">Thrown when trying to write after the stream has been marked as complete.</exception>
  33047. <remarks>
  33048. After writing a segment to the stream using this method, the connection is signaled that data is available to send.
  33049. </remarks>
  33050. </member>
  33051. <member name="M:Best.HTTP.Request.Upload.DynamicUploadStream.Complete">
  33052. <summary>
  33053. Marks the stream as complete, signaling that no more data will be added.
  33054. </summary>
  33055. <remarks>
  33056. All remaining buffered data will be sent to the server.
  33057. </remarks>
  33058. </member>
  33059. <member name="T:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream">
  33060. <summary>
  33061. An <see cref="T:Best.HTTP.Request.Upload.UploadStreamBase"/> based implementation of the <c>multipart/form-data</c> Content-Type. It's very memory-effective, streams are read into memory in chunks.
  33062. </summary>
  33063. <remarks>
  33064. <para>The return value of <see cref="M:System.IO.Stream.Read(System.Byte[],System.Int32,System.Int32)"/> is treated specially in the plugin:
  33065. <list type="bullet">
  33066. <item>
  33067. <term>Less than zero(<c>-1</c>) value </term>
  33068. <description> indicates that no data is currently available but more is expected in the future. In this case, when new data becomes available the IThreadSignaler object must be signaled.</description>
  33069. </item>
  33070. <item>
  33071. <term>Zero (<c>0</c>)</term>
  33072. <description> means that the stream is closed, no more data can be expected.</description>
  33073. </item>
  33074. </list>
  33075. A zero value to signal stream closure can follow a less than zero value.</para>
  33076. </remarks>
  33077. </member>
  33078. <member name="P:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.Length">
  33079. <summary>
  33080. Gets the length of this multipart/form-data stream.
  33081. </summary>
  33082. </member>
  33083. <member name="F:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.boundary">
  33084. <summary>
  33085. A random boundary generated in the constructor.
  33086. </summary>
  33087. </member>
  33088. <member name="M:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.#ctor">
  33089. <summary>
  33090. Initializes a new instance of the MultipartFormDataStream class.
  33091. </summary>
  33092. </member>
  33093. <member name="M:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.#ctor(System.String)">
  33094. <summary>
  33095. Initializes a new instance of the MultipartFormDataStream class with a custom boundary.
  33096. </summary>
  33097. </member>
  33098. <member name="M:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.AddField(System.String,System.String)">
  33099. <summary>
  33100. Adds a textual field to the multipart/form-data stream.
  33101. </summary>
  33102. <param name="fieldName">The name of the field.</param>
  33103. <param name="value">The textual value of the field.</param>
  33104. <returns>The MultipartFormDataStream instance for method chaining.</returns>
  33105. </member>
  33106. <member name="M:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.AddField(System.String,System.String,System.Text.Encoding)">
  33107. <summary>
  33108. Adds a textual field to the multipart/form-data stream.
  33109. </summary>
  33110. <param name="fieldName">The name of the field.</param>
  33111. <param name="value">The textual value of the field.</param>
  33112. <param name="encoding">The encoding to use for the value.</param>
  33113. <returns>The MultipartFormDataStream instance for method chaining.</returns>
  33114. </member>
  33115. <member name="M:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.AddField(System.String,System.Byte[])">
  33116. <summary>
  33117. Adds a stream field to the multipart/form-data stream.
  33118. </summary>
  33119. <param name="fieldName">The name of the field.</param>
  33120. <param name="data">The data containing the field data.</param>
  33121. <returns>The MultipartFormDataStream instance for method chaining.</returns>
  33122. </member>
  33123. <member name="M:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.AddStreamField(System.String,System.IO.Stream)">
  33124. <summary>
  33125. Adds a stream field to the multipart/form-data stream.
  33126. </summary>
  33127. <param name="stream">The stream containing the field data.</param>
  33128. <param name="fieldName">The name of the field.</param>
  33129. <returns>The MultipartFormDataStream instance for method chaining.</returns>
  33130. </member>
  33131. <member name="M:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.AddStreamField(System.String,System.IO.Stream,System.String)">
  33132. <summary>
  33133. Adds a stream field to the multipart/form-data stream.
  33134. </summary>
  33135. <param name="stream">The stream containing the field data.</param>
  33136. <param name="fieldName">The name of the field.</param>
  33137. <param name="fileName">The name of the file, if applicable.</param>
  33138. <returns>The MultipartFormDataStream instance for method chaining.</returns>
  33139. </member>
  33140. <member name="M:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.AddStreamField(System.String,System.IO.Stream,System.String,System.String)">
  33141. <summary>
  33142. Adds a stream field to the multipart/form-data stream.
  33143. </summary>
  33144. <param name="stream">The stream containing the field data.</param>
  33145. <param name="fieldName">The name of the field.</param>
  33146. <param name="fileName">The name of the file, if applicable.</param>
  33147. <param name="mimeType">The MIME type of the content.</param>
  33148. <returns>The MultipartFormDataStream instance for method chaining.</returns>
  33149. </member>
  33150. <member name="M:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.BeforeSendBody(Best.HTTP.HTTPRequest,Best.HTTP.Hosts.Connections.IThreadSignaler)">
  33151. <summary>
  33152. Adds the final boundary to the multipart/form-data stream before sending the request body.
  33153. </summary>
  33154. <param name="request">The HTTP request.</param>
  33155. <param name="threadSignaler">The thread signaler for handling asynchronous operations.</param>
  33156. </member>
  33157. <member name="M:Best.HTTP.Request.Upload.Forms.MultipartFormDataStream.Read(System.Byte[],System.Int32,System.Int32)">
  33158. <summary>
  33159. Reads data from the multipart/form-data stream into the provided buffer.
  33160. </summary>
  33161. <param name="buffer">The buffer to read data into.</param>
  33162. <param name="offset">The starting offset in the buffer.</param>
  33163. <param name="length">The maximum number of bytes to read.</param>
  33164. <returns>The number of bytes read into the buffer.</returns>
  33165. </member>
  33166. <member name="T:Best.HTTP.Request.Upload.Forms.FormField">
  33167. <summary>
  33168. Readonly struct to hold key -> value pairs, where the value is either textual or binary.
  33169. </summary>
  33170. </member>
  33171. <member name="T:Best.HTTP.Request.Upload.Forms.UrlEncodedStream">
  33172. <summary>
  33173. An <see cref="T:Best.HTTP.Request.Upload.UploadStreamBase"/> implementation representing a stream that prepares and sends data as URL-encoded form data in an HTTP request.
  33174. </summary>
  33175. <remarks>
  33176. <para>This stream is used to send data as URL-encoded form data in an HTTP request. It sets the <c>"Content-Type"</c> header to <c>"application/x-www-form-urlencoded"</c>.
  33177. URL-encoded form data is typically used for submitting form data to a web server. It is commonly used in HTTP POST requests to send data to a server, such as submitting HTML form data.</para>
  33178. <para>The return value of <see cref="M:System.IO.Stream.Read(System.Byte[],System.Int32,System.Int32)"/> is treated specially in the plugin:
  33179. <list type="bullet">
  33180. <item>
  33181. <term>Less than zero(<c>-1</c>) value </term>
  33182. <description> indicates that no data is currently available but more is expected in the future. In this case, when new data becomes available the IThreadSignaler object must be signaled.</description>
  33183. </item>
  33184. <item>
  33185. <term>Zero (<c>0</c>)</term>
  33186. <description> means that the stream is closed, no more data can be expected.</description>
  33187. </item>
  33188. </list>
  33189. A zero value to signal stream closure can follow a less than zero value.</para>
  33190. <para>While it's possible, it's not advised to send binary data url-encoded!</para>
  33191. </remarks>
  33192. </member>
  33193. <member name="P:Best.HTTP.Request.Upload.Forms.UrlEncodedStream.Length">
  33194. <summary>
  33195. Gets the length of the stream.
  33196. </summary>
  33197. </member>
  33198. <member name="F:Best.HTTP.Request.Upload.Forms.UrlEncodedStream._fields">
  33199. <summary>
  33200. A list that holds the form's fields.
  33201. </summary>
  33202. </member>
  33203. <member name="M:Best.HTTP.Request.Upload.Forms.UrlEncodedStream.BeforeSendHeaders(Best.HTTP.HTTPRequest)">
  33204. <summary>
  33205. Sets up the HTTP request by adding the <c>"Content-Type"</c> header as <c>"application/x-www-form-urlencoded"</c>.
  33206. </summary>
  33207. <param name="request">The HTTP request.</param>
  33208. </member>
  33209. <member name="M:Best.HTTP.Request.Upload.Forms.UrlEncodedStream.AddBinaryData(System.String,System.Byte[])">
  33210. <summary>
  33211. Adds binary data to the form. It is not advised to send binary data with an URL-encoded form due to the conversion cost of binary to text conversion.
  33212. </summary>
  33213. <param name="fieldName">The name of the field.</param>
  33214. <param name="content">The binary data content.</param>
  33215. <returns>The UrlEncodedStream instance for method chaining.</returns>
  33216. </member>
  33217. <member name="T:Best.HTTP.Request.Upload.JSonDataStream`1">
  33218. <summary>
  33219. An <see cref="T:Best.HTTP.Request.Upload.UploadStreamBase"/> implementation to convert and upload the object as JSON data. It sets the <c>"Content-Type"</c> header to <c>"application/json; charset=utf-8"</c>.
  33220. </summary>
  33221. <typeparam name="T">The type of the object to be converted to JSON.</typeparam>
  33222. <remarks>
  33223. <para>This stream keeps a reference to the object until the preparation in <see cref="M:Best.HTTP.Request.Upload.JSonDataStream`1.BeforeSendHeaders(Best.HTTP.HTTPRequest)"/>. This means, changes to the object after passing it to the constructor will be reflected in the sent data too.</para>
  33224. <para>The return value of <see cref="M:System.IO.Stream.Read(System.Byte[],System.Int32,System.Int32)"/> is treated specially in the plugin:
  33225. <list type="bullet">
  33226. <item>
  33227. <term>Less than zero(<c>-1</c>) value </term>
  33228. <description> indicates that no data is currently available but more is expected in the future. In this case, when new data becomes available the IThreadSignaler object must be signaled.</description>
  33229. </item>
  33230. <item>
  33231. <term>Zero (<c>0</c>)</term>
  33232. <description> means that the stream is closed, no more data can be expected.</description>
  33233. </item>
  33234. </list>
  33235. A zero value to signal stream closure can follow a less than zero value.</para>
  33236. </remarks>
  33237. </member>
  33238. <member name="M:Best.HTTP.Request.Upload.JSonDataStream`1.#ctor(`0)">
  33239. <summary>
  33240. Initializes a new instance of the <see cref="T:Best.HTTP.Request.Upload.JSonDataStream`1"/> class with the specified object.
  33241. </summary>
  33242. <param name="obj">The object to be converted to JSON and uploaded.</param>
  33243. </member>
  33244. <member name="M:Best.HTTP.Request.Upload.JSonDataStream`1.BeforeSendHeaders(Best.HTTP.HTTPRequest)">
  33245. <summary>
  33246. Called before sending out the request's headers. It sets the <c>"Content-Type"</c> header to <c>"application/json; charset=utf-8"</c>.
  33247. </summary>
  33248. <param name="request">The HTTP request.</param>
  33249. </member>
  33250. <member name="M:Best.HTTP.Request.Upload.JSonDataStream`1.Read(System.Byte[],System.Int32,System.Int32)">
  33251. <summary>
  33252. Reads a sequence of bytes from the current stream and advances the position within the stream by the number of bytes read.
  33253. </summary>
  33254. <param name="buffer">An array of bytes. When this method returns, the buffer contains the specified byte array with the values between <paramref name="offset"/> and ( <paramref name="offset"/> + <paramref name="count"/> - 1) replaced by the bytes read from the current source.</param>
  33255. <param name="offset">The zero-based byte offset in <paramref name="buffer"/> at which to begin storing the data read from the current stream.</param>
  33256. <param name="count">The maximum number of bytes to be read from the current stream.</param>
  33257. <returns>The total number of bytes read into the buffer. This can be less than the number of bytes requested if that many bytes are not currently available, or zero (0) if the end of the stream has been reached.</returns>
  33258. </member>
  33259. <member name="M:Best.HTTP.Request.Upload.JSonDataStream`1.Dispose(System.Boolean)">
  33260. <summary>
  33261. Releases the unmanaged resources used by the <see cref="T:Best.HTTP.Request.Upload.JSonDataStream`1"/> and optionally releases the managed resources.
  33262. </summary>
  33263. <param name="disposing"><c>true</c> to release both managed and unmanaged resources; <c>false</c> to release only unmanaged resources.</param>
  33264. </member>
  33265. <member name="T:Best.HTTP.Request.Upload.UploadStreamBase">
  33266. <summary>
  33267. Abstract class to serve as a base for non-conventional streams used in HTTP requests.
  33268. </summary>
  33269. <remarks>
  33270. The return value of <see cref="M:System.IO.Stream.Read(System.Byte[],System.Int32,System.Int32)"/> is treated specially in the plugin:
  33271. <list type="bullet">
  33272. <item>
  33273. <term>Less than zero(<c>-1</c>)</term>
  33274. <description> indicates that no data is currently available but more is expected in the future. In this case, when new data becomes available the IThreadSignaler object must be signaled.</description>
  33275. </item>
  33276. <item>
  33277. <term>Zero (<c>0</c>)</term>
  33278. <description> means that the stream is closed, no more data can be expected.</description>
  33279. </item>
  33280. <item><description>Otherwise it must return with the number bytes copied to the buffer.</description></item>
  33281. </list>
  33282. A zero value to signal stream closure can follow a less than zero value.
  33283. </remarks>
  33284. </member>
  33285. <member name="P:Best.HTTP.Request.Upload.UploadStreamBase.Signaler">
  33286. <summary>
  33287. Gets the <see cref="T:Best.HTTP.Hosts.Connections.IThreadSignaler"/> object for signaling when new data is available.
  33288. </summary>
  33289. </member>
  33290. <member name="P:Best.HTTP.Request.Upload.UploadStreamBase.Length">
  33291. <summary>
  33292. Length in bytes that the stream will upload.
  33293. </summary>
  33294. <remarks>
  33295. The return value of Length is treated specially in the plugin:
  33296. <list type="bullet">
  33297. <item><term>-2</term><description>The stream's length is unknown and the plugin have to send data <c>with 'chunked' transfer-encoding</c>.</description></item>
  33298. <item><term>-1</term><description>The stream's length is unknown and the plugin have to send data <c>as-is, without any encoding</c>.</description></item>
  33299. <item><term>0</term><description>No content to send. The content-length header will contain zero (<c>0</c>).</description></item>
  33300. <item><term>>0</term><description>Length of the content is known, will be sent <c>as-is, without any encoding</c>. The content-length header will contain zero (<c>0</c>).</description></item>
  33301. </list>
  33302. Constants for the first three points can be found in <see cref="T:Best.HTTP.Request.Upload.BodyLengths"/>.
  33303. </remarks>
  33304. </member>
  33305. <member name="M:Best.HTTP.Request.Upload.UploadStreamBase.BeforeSendHeaders(Best.HTTP.HTTPRequest)">
  33306. <summary>
  33307. Called before sending out the request's headers. Perform content processing to calculate the final length if possible.
  33308. In this function the implementor can set headers and other parameters to the request.
  33309. </summary>
  33310. <remarks>Typically called on a thread.</remarks>
  33311. <param name="request">The <see cref="T:Best.HTTP.HTTPRequest"/> associated with the stream.</param>
  33312. </member>
  33313. <member name="M:Best.HTTP.Request.Upload.UploadStreamBase.BeforeSendBody(Best.HTTP.HTTPRequest,Best.HTTP.Hosts.Connections.IThreadSignaler)">
  33314. <summary>
  33315. Called just before sending out the request's body, and saves the <see cref="T:Best.HTTP.Hosts.Connections.IThreadSignaler"/> for signaling when new data is available.
  33316. </summary>
  33317. <param name="request">The HTTPRequest associated with the stream.</param>
  33318. <param name="threadSignaler">The <see cref="T:Best.HTTP.Hosts.Connections.IThreadSignaler"/> object to be used for signaling.</param>
  33319. <remarks>Typically called on a separate thread.</remarks>
  33320. <summary>
  33321. Called just before sending out the request's body, saves the <see cref="T:Best.HTTP.Hosts.Connections.IThreadSignaler"/> that can be used for signaling when new data is available.
  33322. </summary>
  33323. <param name="request">The HTTPRequest associated with the stream.</param>
  33324. <param name="threadSignaler">The <see cref="T:Best.HTTP.Hosts.Connections.IThreadSignaler"/> object to be used for signaling.</param>
  33325. <remarks>Typically called on a separate thread.</remarks>
  33326. </member>
  33327. <member name="T:Best.HTTP.Response.BlockingDownloadContentStream">
  33328. <summary>
  33329. A blocking variant of the <see cref="T:Best.HTTP.Response.DownloadContentStream"/> that allows clients to wait for downloaded data when the buffer is empty but not completed.
  33330. </summary>
  33331. <remarks>
  33332. <para>
  33333. The BlockingDownloadContentStream is a specialized variant of the <see cref="T:Best.HTTP.Response.DownloadContentStream"/> designed to provide a blocking mechanism for clients waiting for downloaded data.
  33334. This class is particularly useful when clients need to read from the stream, but the buffer is temporarily empty due to ongoing downloads.
  33335. </para>
  33336. <para>
  33337. Key Features:
  33338. <list type="bullet">
  33339. <item>
  33340. <term>Blocking Data Retrieval</term>
  33341. <description>Provides a blocking <see cref="M:Best.HTTP.Response.BlockingDownloadContentStream.Take"/> method that allows clients to wait for data if the buffer is empty but not yet completed.</description>
  33342. </item>
  33343. <item>
  33344. <term>Timeout Support</term>
  33345. <description>The <see cref="M:Best.HTTP.Response.BlockingDownloadContentStream.Take(System.TimeSpan)"/> method accepts a timeout parameter, allowing clients to set a maximum wait time for data availability.</description>
  33346. </item>
  33347. <item>
  33348. <term>Exception Handling</term>
  33349. <description>Handles exceptions and errors that occur during download, ensuring that clients receive any relevant exception information.</description>
  33350. </item>
  33351. </list>
  33352. </para>
  33353. <para>
  33354. Clients can use the <see cref="M:Best.HTTP.Response.BlockingDownloadContentStream.Take"/> method to retrieve data from the stream, and if the buffer is empty, the method will block until new data is downloaded or a timeout occurs.
  33355. This blocking behavior is particularly useful in scenarios where clients need to consume data sequentially but can't proceed until data is available.
  33356. </para>
  33357. <para>
  33358. When the download is completed or if an error occurs during download, this stream allows clients to inspect the completion status and any associated exceptions, just like the base <see cref="T:Best.HTTP.Response.DownloadContentStream"/>.
  33359. </para>
  33360. </remarks>
  33361. </member>
  33362. <member name="M:Best.HTTP.Response.BlockingDownloadContentStream.#ctor(Best.HTTP.HTTPResponse,System.Int64,Best.HTTP.Hosts.Connections.IDownloadContentBufferAvailable)">
  33363. <summary>
  33364. Initializes a new instance of the <see cref="T:Best.HTTP.Response.BlockingDownloadContentStream"/> class.
  33365. </summary>
  33366. <param name="response">The HTTP response associated with this download stream.</param>
  33367. <param name="maxBuffered">The maximum size of the internal buffer.</param>
  33368. <param name="bufferAvailableHandler">Handler for notifying when buffer space becomes available.</param>
  33369. </member>
  33370. <member name="M:Best.HTTP.Response.BlockingDownloadContentStream.TryTake(Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment@)">
  33371. <summary>
  33372. Attempts to retrieve a downloaded content-segment from the stream, blocking if necessary until a segment is available.
  33373. </summary>
  33374. <param name="segment">When this method returns, contains the <see cref="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment"/> instance representing the data, if available; otherwise, contains the value of <see cref="F:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment.Empty"/>. This parameter is passed uninitialized.</param>
  33375. <returns><c>true</c> if a segment could be retrieved; otherwise, <c>false</c>.</returns>
  33376. <remarks>
  33377. <para>
  33378. The TryTake function provides a blocking approach to retrieve data from the stream.
  33379. If the stream has data available, it immediately returns the data.
  33380. If there's no data available, the method will block until new data is downloaded or the buffer is marked as completed.
  33381. </para>
  33382. <para>
  33383. This method is designed for scenarios where clients need to read from the stream sequentially and are willing to wait until data is available.
  33384. It ensures that clients receive data as soon as it becomes available, without having to repeatedly check or poll the stream.
  33385. </para>
  33386. </remarks>
  33387. </member>
  33388. <member name="M:Best.HTTP.Response.BlockingDownloadContentStream.Take">
  33389. <summary>
  33390. Returns with a download content-segment. If the stream is currently empty but not completed the execution is blocked until new data downloaded.
  33391. A segment is an arbitrary length array of bytes the plugin could read in one operation, it can range from couple of bytes to kilobytes.
  33392. </summary>
  33393. <returns>A BufferSegment holding a reference to the byte[] containing the downloaded data, offset and count of bytes in the array.</returns>
  33394. <exception cref="T:System.ObjectDisposedException">The stream is disposed.</exception>
  33395. <exception cref="T:System.InvalidOperationException">The stream is empty and marked as completed.</exception>
  33396. </member>
  33397. <member name="M:Best.HTTP.Response.BlockingDownloadContentStream.Take(System.TimeSpan)">
  33398. <summary>
  33399. Returns with a download content-segment. If the stream is currently empty but not completed the execution is blocked until new data downloaded or the timeout is reached.
  33400. A segment is an arbitrary length array of bytes the plugin could read in one operation, it can range from couple of bytes to kilobytes.
  33401. </summary>
  33402. <param name="timeout">A TimeSpan that represents the number of milliseconds to wait, or a TimeSpan that represents -1 milliseconds to wait indefinitely.</param>
  33403. <returns>A BufferSegment holding a reference to the byte[] containing the downloaded data, offset and count of bytes in the array. In case of a timeout, BufferSegment.Empty returned.</returns>
  33404. <exception cref="T:System.ObjectDisposedException">The stream is disposed.</exception>
  33405. <exception cref="T:System.InvalidOperationException">The stream is empty and marked as completed.</exception>
  33406. </member>
  33407. <member name="M:Best.HTTP.Response.BlockingDownloadContentStream.Read(System.Byte[],System.Int32,System.Int32)">
  33408. <summary>
  33409. Reads a sequence of bytes from the current stream and advances the position within the stream by the number of bytes read.
  33410. </summary>
  33411. <remarks>
  33412. <para>
  33413. This override of the <see cref="M:Best.HTTP.Response.BlockingDownloadContentStream.Read(System.Byte[],System.Int32,System.Int32)"/> method provides blocking behavior, meaning if there are no bytes available in the stream, the method will block until new data is downloaded or until the stream completes. Once data is available, or if the stream completes, the method will return with the number of bytes read.
  33414. </para>
  33415. <para>
  33416. This behavior ensures that consumers of the stream can continue reading data sequentially, even if the stream's internal buffer is temporarily empty due to ongoing downloads.
  33417. </para>
  33418. </remarks>
  33419. <param name="buffer">An array of bytes. When this method returns, the buffer contains the specified byte array with the values between <paramref name="offset"/> and (<paramref name="offset"/> + <paramref name="count"/> - 1) replaced by the bytes read from the current source.</param>
  33420. <param name="offset">The zero-based byte offset in <paramref name="buffer"/> at which to begin storing the data read from the current stream.</param>
  33421. <param name="count">The maximum number of bytes to be read from the current stream.</param>
  33422. <returns>
  33423. The total number of bytes read into the buffer. This can be less than the number of bytes requested if that many bytes are not currently available, or zero if the end of the stream is reached.
  33424. </returns>
  33425. </member>
  33426. <member name="M:Best.HTTP.Response.BlockingDownloadContentStream.WaitForEvent(System.TimeSpan)">
  33427. <summary>
  33428. Instead of calling WaitOne once for the total duration of the timeout,
  33429. periodically check whether we are disposed or not.
  33430. </summary>
  33431. </member>
  33432. <member name="T:Best.HTTP.Response.DownloadContentStream">
  33433. <summary>
  33434. A read-only stream that the plugin uses to store the downloaded content. This stream is designed to buffer downloaded data efficiently and provide it to consumers.
  33435. </summary>
  33436. <remarks>
  33437. <para>
  33438. The DownloadContentStream serves as a storage medium for content downloaded during HTTP requests.
  33439. It buffers the downloaded data in segments and allows clients to read from the buffer as needed.
  33440. This buffering mechanism is essential for optimizing download performance, especially in scenarios where the download rate may vary or be faster than the rate at which data is consumed.
  33441. </para>
  33442. <para>
  33443. The stream operates in conjunction with the <see cref="T:Best.HTTP.Hosts.Connections.IDownloadContentBufferAvailable"/> interface, which is used to signal connections when buffer space becomes available.
  33444. Connections can then transfer additional data into the buffer for processing.
  33445. </para>
  33446. <para>
  33447. <list type="bullet">
  33448. <item>
  33449. <term>Efficient Buffering</term>
  33450. <description>The stream efficiently buffers downloaded content, ensuring that data is readily available for reading without extensive delays.</description>
  33451. </item>
  33452. <item>
  33453. <term>Dynamic Resizing</term>
  33454. <description>The internal buffer dynamically resizes to accommodate varying amounts of downloaded data, optimizing memory usage.</description>
  33455. </item>
  33456. <item>
  33457. <term>Asynchronous Signal Handling</term>
  33458. <description>Asynchronous signaling mechanisms are used to notify connections when buffer space is available, enabling efficient data transfer.</description>
  33459. </item>
  33460. <item>
  33461. <term>Error Handling</term>
  33462. <description>The stream captures and propagates errors that occur during download, allowing clients to handle exceptions gracefully.</description>
  33463. </item>
  33464. <item>
  33465. <term>Blocking Variant</term>
  33466. <description>A blocking variant, <see cref="T:Best.HTTP.Response.BlockingDownloadContentStream"/>, allows clients to wait for data when the buffer is empty but not completed.</description>
  33467. </item>
  33468. </list>
  33469. </para>
  33470. <para>
  33471. Clients can read from this stream using standard stream reading methods, and the stream will release memory segments as data is read.
  33472. When the download is completed or if an error occurs during download, this stream allows clients to inspect the completion status and any associated exceptions.
  33473. </para>
  33474. </remarks>
  33475. </member>
  33476. <member name="P:Best.HTTP.Response.DownloadContentStream.Response">
  33477. <summary>
  33478. Gets the HTTP response from which this download stream originated.
  33479. </summary>
  33480. </member>
  33481. <member name="P:Best.HTTP.Response.DownloadContentStream.IsCompleted">
  33482. <summary>
  33483. Gets a value indicating whether the download is completed, and there's no more data buffered in the stream to read.
  33484. </summary>
  33485. </member>
  33486. <member name="P:Best.HTTP.Response.DownloadContentStream.CompletedWith">
  33487. <summary>
  33488. Gets a reference to an exception if the download completed with an error.
  33489. </summary>
  33490. </member>
  33491. <member name="P:Best.HTTP.Response.DownloadContentStream.Length">
  33492. <summary>
  33493. Gets the length of the buffered data. Because downloads happen in parallel, a <see cref="M:Best.HTTP.Response.DownloadContentStream.Read(System.Byte[],System.Int32,System.Int32)"/> call can return with more data after checking Length.
  33494. </summary>
  33495. </member>
  33496. <member name="P:Best.HTTP.Response.DownloadContentStream.MaxBuffered">
  33497. <summary>
  33498. Gets the maximum size of the internal buffer of this stream.
  33499. </summary>
  33500. <remarks>In some cases, the plugin may put more data into the stream than the specified size.</remarks>
  33501. </member>
  33502. <member name="P:Best.HTTP.Response.DownloadContentStream.IsFull">
  33503. <summary>
  33504. Gets a value indicating whether the internal buffer holds at least the <see cref="P:Best.HTTP.Response.DownloadContentStream.MaxBuffered"/> amount of data.
  33505. </summary>
  33506. </member>
  33507. <member name="P:Best.HTTP.Response.DownloadContentStream.IsDetached">
  33508. <summary>
  33509. Gets or sets whether the stream is detached from the <see cref="T:Best.HTTP.HTTPRequest"/>/<see cref="T:Best.HTTP.HTTPResponse"/> when <see cref="M:Best.HTTP.Response.DownloadContentStream.Read(System.Byte[],System.Int32,System.Int32)"/> is used before the request is finished.
  33510. When the stream is detached from the response object, their lifetimes are not bound together,
  33511. meaning that the stream isn't disposed automatically, and the client code is responsible for calling the stream's <see cref="M:System.IO.Stream.Dispose"/> function.
  33512. </summary>
  33513. </member>
  33514. <member name="M:Best.HTTP.Response.DownloadContentStream.EmergencyIncreaseMaxBuffered">
  33515. <summary>
  33516. There are cases where the plugin have to put more data into the buffer than its previously set maximum.
  33517. For example when the underlying connection is closed, but the content provider still have buffered data,
  33518. in witch case we have to push all processed data to the user facing download stream.
  33519. </summary>
  33520. </member>
  33521. <member name="F:Best.HTTP.Response.DownloadContentStream._isFullCheckCount">
  33522. <summary>
  33523. Count of consecutive calls with DoFullCheck that found the stream fully buffered.
  33524. </summary>
  33525. </member>
  33526. <member name="M:Best.HTTP.Response.DownloadContentStream.#ctor(Best.HTTP.HTTPResponse,System.Int64,Best.HTTP.Hosts.Connections.IDownloadContentBufferAvailable)">
  33527. <summary>
  33528. Initializes a new instance of the DownloadContentStream class.
  33529. </summary>
  33530. <param name="response">The HTTP response associated with this download stream.</param>
  33531. <param name="maxBuffered">The maximum size of the internal buffer.</param>
  33532. <param name="bufferAvailableHandler">Handler for notifying when buffer space becomes available.</param>
  33533. </member>
  33534. <member name="M:Best.HTTP.Response.DownloadContentStream.CompleteAdding(System.Exception)">
  33535. <summary>
  33536. Completes the download stream with an optional error. Called when the download is finished.
  33537. </summary>
  33538. <param name="error">The exception that occurred during download, if any.</param>
  33539. </member>
  33540. <member name="M:Best.HTTP.Response.DownloadContentStream.TryTake(Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment@)">
  33541. <summary>
  33542. Tries to remove a downloaded segment from the stream. If the stream is empty, it returns immediately with false.
  33543. </summary>
  33544. <param name="segment">A <see cref="T:Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment"/> containing the reference to a byte[] and the offset and count of the data in the array.</param>
  33545. <returns><c>true</c> if a downloaded segment was available and could return with, otherwise <c>false</c></returns>
  33546. </member>
  33547. <member name="M:Best.HTTP.Response.DownloadContentStream.Read(System.Byte[],System.Int32,System.Int32)">
  33548. <summary>
  33549. A non-blocking Read function. When it returns <c>0</c>, it doesn't mean the download is complete. If the download interrupted before completing, the next Read call can throw an exception.
  33550. </summary>
  33551. <param name="buffer">The buffer to read data into.</param>
  33552. <param name="offset">The zero-based byte offset in the buffer at which to begin copying bytes.</param>
  33553. <param name="count">The maximum number of bytes to read.</param>
  33554. <returns>The number of bytes copied to the buffer, or zero if no downloaded data is available at the time of the call.</returns>
  33555. <exception cref="T:System.ObjectDisposedException">If the stream is already disposed.</exception>
  33556. </member>
  33557. <member name="M:Best.HTTP.Response.DownloadContentStream.Write(Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment)">
  33558. <summary>
  33559. Writes a downloaded data segment to the stream.
  33560. </summary>
  33561. <param name="segment">The downloaded data segment to write.</param>
  33562. </member>
  33563. <member name="M:Best.HTTP.Response.DownloadContentStream.DoFullCheck(System.Int32)">
  33564. <summary>
  33565. Checks whether the stream is fully buffered and increases a counter if it's full, resetting it otherwise.
  33566. </summary>
  33567. <param name="limit">The limit for the full check counter.</param>
  33568. <returns><c>true</c> if the counter is equal to or larger than the limit parameter; otherwise <c>false</c>.</returns>
  33569. </member>
  33570. <member name="M:Best.HTTP.Response.DownloadContentStream.Dispose(System.Boolean)">
  33571. <summary>
  33572. Disposes of the stream, releasing any resources held by it.
  33573. </summary>
  33574. <param name="disposing"><c>true</c> to release both managed and unmanaged resources; <c>false</c> to release only unmanaged resources.</param>
  33575. </member>
  33576. <member name="T:Best.HTTP.Response.HTTPStatusCodes">
  33577. <summary>
  33578. Provides constants representing various HTTP status codes.
  33579. </summary>
  33580. </member>
  33581. <member name="T:Best.HTTP.HTTPResponse">
  33582. <summary>
  33583. Represents an HTTP response received from a remote server, containing information about the response status, headers, and data.
  33584. </summary>
  33585. <remarks>
  33586. <para>
  33587. The HTTPResponse class represents an HTTP response received from a remote server. It contains information about the response status, headers, and the data content.
  33588. </para>
  33589. <para>
  33590. Key Features:
  33591. <list type="bullet">
  33592. <item>
  33593. <term>Response Properties</term>
  33594. <description>Provides access to various properties such as <see cref="P:Best.HTTP.HTTPResponse.HTTPVersion"/>, <see cref="P:Best.HTTP.HTTPResponse.StatusCode"/>, <see cref="P:Best.HTTP.HTTPResponse.Message"/>, and more, to inspect the response details.</description>
  33595. </item>
  33596. <item>
  33597. <term>Data Access</term>
  33598. <description>Allows access to the response data in various forms, including raw bytes, UTF-8 text, and as a <see cref="T:UnityEngine.Texture2D"/> for image data.</description>
  33599. </item>
  33600. <item>
  33601. <term>Header Management</term>
  33602. <description>Provides methods to add, retrieve, and manipulate HTTP headers associated with the response, making it easy to inspect and work with header information.</description>
  33603. </item>
  33604. <item>
  33605. <term>Caching Support</term>
  33606. <description>Supports response caching, enabling the storage of downloaded data in local cache storage for future use.</description>
  33607. </item>
  33608. <item>
  33609. <term>Stream Management</term>
  33610. <description>Manages the download process and data streaming through a <see cref="T:Best.HTTP.Response.DownloadContentStream"/> (<see cref="P:Best.HTTP.HTTPResponse.DownStream"/>) to optimize memory usage and ensure efficient handling of large response bodies.</description>
  33611. </item>
  33612. </list>
  33613. </para>
  33614. </remarks>
  33615. </member>
  33616. <member name="P:Best.HTTP.HTTPResponse.HTTPVersion">
  33617. <summary>
  33618. Gets the version of the HTTP protocol with which the response was received. Typically, this is HTTP/1.1 for local file and cache responses, even if the original response received with a different version.
  33619. </summary>
  33620. </member>
  33621. <member name="P:Best.HTTP.HTTPResponse.StatusCode">
  33622. <summary>
  33623. Gets the HTTP status code sent from the server, indicating the outcome of the HTTP request.
  33624. </summary>
  33625. </member>
  33626. <member name="P:Best.HTTP.HTTPResponse.Message">
  33627. <summary>
  33628. Gets the message sent along with the status code from the server. This message can add some details, but it's empty for HTTP/2 responses.
  33629. </summary>
  33630. </member>
  33631. <member name="P:Best.HTTP.HTTPResponse.IsSuccess">
  33632. <summary>
  33633. Gets a value indicating whether the response represents a successful HTTP request. Returns true if the status code is in the range of [200..300[ or 304 (Not Modified).
  33634. </summary>
  33635. </member>
  33636. <member name="P:Best.HTTP.HTTPResponse.IsFromCache">
  33637. <summary>
  33638. Gets a value indicating whether the response body is read from the cache.
  33639. </summary>
  33640. </member>
  33641. <member name="P:Best.HTTP.HTTPResponse.Headers">
  33642. <summary>
  33643. Gets the headers sent from the server as key-value pairs. You can use additional methods to manage and retrieve header information.
  33644. </summary>
  33645. <remarks>
  33646. The Headers property provides access to the headers sent by the server in the HTTP response. You can use the following methods to work with headers:
  33647. <list type="bullet">
  33648. <item><term><see cref="M:Best.HTTP.HTTPResponse.AddHeader(System.String,System.String)"/> </term><description>Adds an HTTP header with the specified name and value to the response headers.</description></item>
  33649. <item><term><see cref="M:Best.HTTP.HTTPResponse.GetHeaderValues(System.String)"/> </term><description>Retrieves the list of values for a given header name as received from the server.</description></item>
  33650. <item><term><see cref="M:Best.HTTP.HTTPResponse.GetFirstHeaderValue(System.String)"/> </term><description>Retrieves the first value for a given header name as received from the server.</description></item>
  33651. <item><term><see cref="M:Best.HTTP.HTTPResponse.HasHeaderWithValue(System.String,System.String)"/> </term><description>Checks if a header with the specified name and value exists in the response headers.</description></item>
  33652. <item><term><see cref="M:Best.HTTP.HTTPResponse.HasHeader(System.String)"/> </term><description>Checks if a header with the specified name exists in the response headers.</description></item>
  33653. <item><term><see cref="M:Best.HTTP.HTTPResponse.GetRange"/></term><description>Parses the 'Content-Range' header's value and returns a <see cref="T:Best.HTTP.HTTPRange"/> object representing the byte range of the response content.</description></item>
  33654. </list>
  33655. </remarks>
  33656. </member>
  33657. <member name="P:Best.HTTP.HTTPResponse.Data">
  33658. <summary>
  33659. The data that downloaded from the server. All Transfer and Content encodings decoded if any(eg. chunked, gzip, deflate).
  33660. </summary>
  33661. </member>
  33662. <member name="P:Best.HTTP.HTTPResponse.IsUpgraded">
  33663. <summary>
  33664. The normal HTTP protocol is upgraded to an other.
  33665. </summary>
  33666. </member>
  33667. <member name="F:Best.HTTP.HTTPResponse.dataAsText">
  33668. <summary>
  33669. Cached, converted data.
  33670. </summary>
  33671. </member>
  33672. <member name="P:Best.HTTP.HTTPResponse.DataAsText">
  33673. <summary>
  33674. The data converted to an UTF8 string.
  33675. </summary>
  33676. </member>
  33677. <member name="F:Best.HTTP.HTTPResponse.texture">
  33678. <summary>
  33679. Cached converted data.
  33680. </summary>
  33681. </member>
  33682. <member name="P:Best.HTTP.HTTPResponse.DataAsTexture2D">
  33683. <summary>
  33684. The data loaded to a Texture2D.
  33685. </summary>
  33686. </member>
  33687. <member name="P:Best.HTTP.HTTPResponse.DownStream">
  33688. <summary>
  33689. Reference to the <see cref="T:Best.HTTP.Response.DownloadContentStream"/> instance that contains the downloaded data.
  33690. </summary>
  33691. </member>
  33692. <member name="P:Best.HTTP.HTTPResponse.Context">
  33693. <summary>
  33694. IProtocol.LoggingContext implementation.
  33695. </summary>
  33696. </member>
  33697. <member name="P:Best.HTTP.HTTPResponse.Request">
  33698. <summary>
  33699. The original request that this response is created for.
  33700. </summary>
  33701. </member>
  33702. <member name="M:Best.HTTP.HTTPResponse.AddHeader(System.String,System.String)">
  33703. <summary>
  33704. Adds an HTTP header with the specified name and value to the response headers.
  33705. </summary>
  33706. <param name="name">The name of the header.</param>
  33707. <param name="value">The value of the header.</param>
  33708. </member>
  33709. <member name="M:Best.HTTP.HTTPResponse.GetHeaderValues(System.String)">
  33710. <summary>
  33711. Retrieves the list of values for a given header name as received from the server.
  33712. </summary>
  33713. <param name="name">The name of the header.</param>
  33714. <returns>
  33715. A list of header values if the header exists and contains values; otherwise, returns <c>null</c>.
  33716. </returns>
  33717. </member>
  33718. <member name="M:Best.HTTP.HTTPResponse.GetFirstHeaderValue(System.String)">
  33719. <summary>
  33720. Retrieves the first value for a given header name as received from the server.
  33721. </summary>
  33722. <param name="name">The name of the header.</param>
  33723. <returns>
  33724. The first header value if the header exists and contains values; otherwise, returns <c>null</c>.
  33725. </returns>
  33726. </member>
  33727. <member name="M:Best.HTTP.HTTPResponse.HasHeaderWithValue(System.String,System.String)">
  33728. <summary>
  33729. Checks if a header with the specified name and value exists in the response headers.
  33730. </summary>
  33731. <param name="headerName">The name of the header to check.</param>
  33732. <param name="value">The value to check for in the header.</param>
  33733. <returns>
  33734. <c>true</c> if a header with the given name and value exists in the response headers; otherwise, <c>false</c>.
  33735. </returns>
  33736. </member>
  33737. <member name="M:Best.HTTP.HTTPResponse.HasHeader(System.String)">
  33738. <summary>
  33739. Checks if a header with the specified name exists in the response headers.
  33740. </summary>
  33741. <param name="headerName">The name of the header to check.</param>
  33742. <returns>
  33743. <c>true</c> if a header with the given name exists in the response headers; otherwise, <c>false</c>.
  33744. </returns>
  33745. </member>
  33746. <member name="M:Best.HTTP.HTTPResponse.GetRange">
  33747. <summary>
  33748. Parses the <c>'Content-Range'</c> header's value and returns a <see cref="T:Best.HTTP.HTTPRange"/> object representing the byte range of the response content.
  33749. </summary>
  33750. <remarks>
  33751. If the server ignores a byte-range-spec because it is syntactically invalid, the server SHOULD treat the request as if the invalid Range header field did not exist.
  33752. (Normally, this means return a 200 response containing the full entity). In this case because there are no <c>'Content-Range'</c> header values, this function will return <c>null</c>.
  33753. </remarks>
  33754. <returns>
  33755. A <see cref="T:Best.HTTP.HTTPRange"/> object representing the byte range of the response content, or <c>null</c> if no '<c>Content-Range</c>' header is found.
  33756. </returns>
  33757. </member>
  33758. <member name="M:Best.HTTP.HTTPResponse.FeedDownloadedContentChunk(Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment)">
  33759. <summary>
  33760. Add data to the fragments list.
  33761. </summary>
  33762. <param name="buffer">The buffer to be added.</param>
  33763. <param name="pos">The position where we start copy the data.</param>
  33764. <param name="length">How many data we want to copy.</param>
  33765. </member>
  33766. <member name="M:Best.HTTP.HTTPResponse.Dispose">
  33767. <summary>
  33768. IDisposable implementation.
  33769. </summary>
  33770. </member>
  33771. <member name="T:Best.HTTP.Futures.FutureState">
  33772. <summary>
  33773. Describes the state of a future.
  33774. </summary>
  33775. </member>
  33776. <member name="F:Best.HTTP.Futures.FutureState.Pending">
  33777. <summary>
  33778. The future hasn't begun to resolve a value.
  33779. </summary>
  33780. </member>
  33781. <member name="F:Best.HTTP.Futures.FutureState.Processing">
  33782. <summary>
  33783. The future is working on resolving a value.
  33784. </summary>
  33785. </member>
  33786. <member name="F:Best.HTTP.Futures.FutureState.Success">
  33787. <summary>
  33788. The future has a value ready.
  33789. </summary>
  33790. </member>
  33791. <member name="F:Best.HTTP.Futures.FutureState.Error">
  33792. <summary>
  33793. The future failed to resolve a value.
  33794. </summary>
  33795. </member>
  33796. <member name="T:Best.HTTP.Futures.IFuture`1">
  33797. <summary>
  33798. Defines the interface of an object that can be used to track a future value.
  33799. </summary>
  33800. <typeparam name="T">The type of object being retrieved.</typeparam>
  33801. </member>
  33802. <member name="P:Best.HTTP.Futures.IFuture`1.state">
  33803. <summary>
  33804. Gets the state of the future.
  33805. </summary>
  33806. </member>
  33807. <member name="P:Best.HTTP.Futures.IFuture`1.value">
  33808. <summary>
  33809. Gets the value if the State is Success.
  33810. </summary>
  33811. </member>
  33812. <member name="P:Best.HTTP.Futures.IFuture`1.error">
  33813. <summary>
  33814. Gets the failure exception if the State is Error.
  33815. </summary>
  33816. </member>
  33817. <member name="M:Best.HTTP.Futures.IFuture`1.OnItem(Best.HTTP.Futures.FutureValueCallback{`0})">
  33818. <summary>
  33819. Adds a new callback to invoke when an intermediate result is known.
  33820. </summary>
  33821. <param name="callback">The callback to invoke.</param>
  33822. <returns>The future so additional calls can be chained together.</returns>
  33823. </member>
  33824. <member name="M:Best.HTTP.Futures.IFuture`1.OnSuccess(Best.HTTP.Futures.FutureValueCallback{`0})">
  33825. <summary>
  33826. Adds a new callback to invoke if the future value is retrieved successfully.
  33827. </summary>
  33828. <param name="callback">The callback to invoke.</param>
  33829. <returns>The future so additional calls can be chained together.</returns>
  33830. </member>
  33831. <member name="M:Best.HTTP.Futures.IFuture`1.OnError(Best.HTTP.Futures.FutureErrorCallback)">
  33832. <summary>
  33833. Adds a new callback to invoke if the future has an error.
  33834. </summary>
  33835. <param name="callback">The callback to invoke.</param>
  33836. <returns>The future so additional calls can be chained together.</returns>
  33837. </member>
  33838. <member name="M:Best.HTTP.Futures.IFuture`1.OnComplete(Best.HTTP.Futures.FutureCallback{`0})">
  33839. <summary>
  33840. Adds a new callback to invoke if the future value is retrieved successfully or has an error.
  33841. </summary>
  33842. <param name="callback">The callback to invoke.</param>
  33843. <returns>The future so additional calls can be chained together.</returns>
  33844. </member>
  33845. <member name="T:Best.HTTP.Futures.FutureCallback`1">
  33846. <summary>
  33847. Defines the signature for callbacks used by the future.
  33848. </summary>
  33849. <param name="future">The future.</param>
  33850. </member>
  33851. <member name="T:Best.HTTP.Futures.Future`1">
  33852. <summary>
  33853. An implementation of <see cref="T:Best.HTTP.Futures.IFuture`1"/> that can be used internally by methods that return futures.
  33854. </summary>
  33855. <remarks>
  33856. Methods should always return the <see cref="T:Best.HTTP.Futures.IFuture`1"/> interface when calling code requests a future.
  33857. This class is intended to be constructed internally in the method to provide a simple implementation of
  33858. the interface. By returning the interface instead of the class it ensures the implementation can change
  33859. later on if requirements change, without affecting the calling code.
  33860. </remarks>
  33861. <typeparam name="T">The type of object being retrieved.</typeparam>
  33862. </member>
  33863. <member name="P:Best.HTTP.Futures.Future`1.state">
  33864. <summary>
  33865. Gets the state of the future.
  33866. </summary>
  33867. </member>
  33868. <member name="P:Best.HTTP.Futures.Future`1.value">
  33869. <summary>
  33870. Gets the value if the State is Success.
  33871. </summary>
  33872. </member>
  33873. <member name="P:Best.HTTP.Futures.Future`1.error">
  33874. <summary>
  33875. Gets the failure exception if the State is Error.
  33876. </summary>
  33877. </member>
  33878. <member name="M:Best.HTTP.Futures.Future`1.#ctor">
  33879. <summary>
  33880. Initializes a new instance of the <see cref="T:Best.HTTP.Futures.Future`1"/> class.
  33881. </summary>
  33882. </member>
  33883. <member name="M:Best.HTTP.Futures.Future`1.OnSuccess(Best.HTTP.Futures.FutureValueCallback{`0})">
  33884. <summary>
  33885. Adds a new callback to invoke if the future value is retrieved successfully.
  33886. </summary>
  33887. <param name="callback">The callback to invoke.</param>
  33888. <returns>The future so additional calls can be chained together.</returns>
  33889. </member>
  33890. <member name="M:Best.HTTP.Futures.Future`1.OnError(Best.HTTP.Futures.FutureErrorCallback)">
  33891. <summary>
  33892. Adds a new callback to invoke if the future has an error.
  33893. </summary>
  33894. <param name="callback">The callback to invoke.</param>
  33895. <returns>The future so additional calls can be chained together.</returns>
  33896. </member>
  33897. <member name="M:Best.HTTP.Futures.Future`1.OnComplete(Best.HTTP.Futures.FutureCallback{`0})">
  33898. <summary>
  33899. Adds a new callback to invoke if the future value is retrieved successfully or has an error.
  33900. </summary>
  33901. <param name="callback">The callback to invoke.</param>
  33902. <returns>The future so additional calls can be chained together.</returns>
  33903. </member>
  33904. <member name="M:Best.HTTP.Futures.Future`1.Process(System.Func{`0})">
  33905. <summary>
  33906. Begins running a given function on a background thread to resolve the future's value, as long
  33907. as it is still in the Pending state.
  33908. </summary>
  33909. <param name="func">The function that will retrieve the desired value.</param>
  33910. </member>
  33911. <member name="M:Best.HTTP.Futures.Future`1.Assign(`0)">
  33912. <summary>
  33913. Allows manually assigning a value to a future, as long as it is still in the pending state.
  33914. </summary>
  33915. <remarks>
  33916. There are times where you may not need to do background processing for a value. For example,
  33917. you may have a cache of values and can just hand one out. In those cases you still want to
  33918. return a future for the method signature, but can just call this method to fill in the future.
  33919. </remarks>
  33920. <param name="value">The value to assign the future.</param>
  33921. </member>
  33922. <member name="M:Best.HTTP.Futures.Future`1.Fail(System.Exception)">
  33923. <summary>
  33924. Allows manually failing a future, as long as it is still in the pending state.
  33925. </summary>
  33926. <remarks>
  33927. As with the Assign method, there are times where you may know a future value is a failure without
  33928. doing any background work. In those cases you can simply fail the future manually and return it.
  33929. </remarks>
  33930. <param name="error">The exception to use to fail the future.</param>
  33931. </member>
  33932. <member name="T:PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction">
  33933. <summary>
  33934. This enum describes the action that caused a CollectionChanged event.
  33935. </summary>
  33936. </member>
  33937. <member name="F:PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Add">
  33938. <summary> One or more items were added to the collection. </summary>
  33939. </member>
  33940. <member name="F:PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Remove">
  33941. <summary> One or more items were removed from the collection. </summary>
  33942. </member>
  33943. <member name="F:PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Replace">
  33944. <summary> One or more items were replaced in the collection. </summary>
  33945. </member>
  33946. <member name="F:PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Move">
  33947. <summary> One or more items were moved within the collection. </summary>
  33948. </member>
  33949. <member name="F:PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Reset">
  33950. <summary> The contents of the collection changed dramatically. </summary>
  33951. </member>
  33952. <member name="T:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs">
  33953. <summary>
  33954. Arguments for the CollectionChanged event.
  33955. A collection that supports INotifyCollectionChangedThis raises this event
  33956. whenever an item is added or removed, or when the contents of the collection
  33957. changes dramatically.
  33958. </summary>
  33959. </member>
  33960. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction)">
  33961. <summary>
  33962. Construct a NotifyCollectionChangedEventArgs that describes a reset change.
  33963. </summary>
  33964. <param name="action">The action that caused the event (must be Reset).</param>
  33965. </member>
  33966. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction,System.Object)">
  33967. <summary>
  33968. Construct a NotifyCollectionChangedEventArgs that describes a one-item change.
  33969. </summary>
  33970. <param name="action">The action that caused the event; can only be Reset, Add or Remove action.</param>
  33971. <param name="changedItem">The item affected by the change.</param>
  33972. </member>
  33973. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction,System.Object,System.Int32)">
  33974. <summary>
  33975. Construct a NotifyCollectionChangedEventArgs that describes a one-item change.
  33976. </summary>
  33977. <param name="action">The action that caused the event.</param>
  33978. <param name="changedItem">The item affected by the change.</param>
  33979. <param name="index">The index where the change occurred.</param>
  33980. </member>
  33981. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction,System.Collections.IList)">
  33982. <summary>
  33983. Construct a NotifyCollectionChangedEventArgs that describes a multi-item change.
  33984. </summary>
  33985. <param name="action">The action that caused the event.</param>
  33986. <param name="changedItems">The items affected by the change.</param>
  33987. </member>
  33988. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction,System.Collections.IList,System.Int32)">
  33989. <summary>
  33990. Construct a NotifyCollectionChangedEventArgs that describes a multi-item change (or a reset).
  33991. </summary>
  33992. <param name="action">The action that caused the event.</param>
  33993. <param name="changedItems">The items affected by the change.</param>
  33994. <param name="startingIndex">The index where the change occurred.</param>
  33995. </member>
  33996. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction,System.Object,System.Object)">
  33997. <summary>
  33998. Construct a NotifyCollectionChangedEventArgs that describes a one-item Replace event.
  33999. </summary>
  34000. <param name="action">Can only be a Replace action.</param>
  34001. <param name="newItem">The new item replacing the original item.</param>
  34002. <param name="oldItem">The original item that is replaced.</param>
  34003. </member>
  34004. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction,System.Object,System.Object,System.Int32)">
  34005. <summary>
  34006. Construct a NotifyCollectionChangedEventArgs that describes a one-item Replace event.
  34007. </summary>
  34008. <param name="action">Can only be a Replace action.</param>
  34009. <param name="newItem">The new item replacing the original item.</param>
  34010. <param name="oldItem">The original item that is replaced.</param>
  34011. <param name="index">The index of the item being replaced.</param>
  34012. </member>
  34013. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction,System.Collections.IList,System.Collections.IList)">
  34014. <summary>
  34015. Construct a NotifyCollectionChangedEventArgs that describes a multi-item Replace event.
  34016. </summary>
  34017. <param name="action">Can only be a Replace action.</param>
  34018. <param name="newItems">The new items replacing the original items.</param>
  34019. <param name="oldItems">The original items that are replaced.</param>
  34020. </member>
  34021. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction,System.Collections.IList,System.Collections.IList,System.Int32)">
  34022. <summary>
  34023. Construct a NotifyCollectionChangedEventArgs that describes a multi-item Replace event.
  34024. </summary>
  34025. <param name="action">Can only be a Replace action.</param>
  34026. <param name="newItems">The new items replacing the original items.</param>
  34027. <param name="oldItems">The original items that are replaced.</param>
  34028. <param name="startingIndex">The starting index of the items being replaced.</param>
  34029. </member>
  34030. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction,System.Object,System.Int32,System.Int32)">
  34031. <summary>
  34032. Construct a NotifyCollectionChangedEventArgs that describes a one-item Move event.
  34033. </summary>
  34034. <param name="action">Can only be a Move action.</param>
  34035. <param name="changedItem">The item affected by the change.</param>
  34036. <param name="index">The new index for the changed item.</param>
  34037. <param name="oldIndex">The old index for the changed item.</param>
  34038. </member>
  34039. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction,System.Collections.IList,System.Int32,System.Int32)">
  34040. <summary>
  34041. Construct a NotifyCollectionChangedEventArgs that describes a multi-item Move event.
  34042. </summary>
  34043. <param name="action">The action that caused the event.</param>
  34044. <param name="changedItems">The items affected by the change.</param>
  34045. <param name="index">The new index for the changed items.</param>
  34046. <param name="oldIndex">The old index for the changed items.</param>
  34047. </member>
  34048. <member name="M:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.#ctor(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction,System.Collections.IList,System.Collections.IList,System.Int32,System.Int32)">
  34049. <summary>
  34050. Construct a NotifyCollectionChangedEventArgs with given fields (no validation). Used by WinRT marshaling.
  34051. </summary>
  34052. </member>
  34053. <member name="P:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.Action">
  34054. <summary>
  34055. The action that caused the event.
  34056. </summary>
  34057. </member>
  34058. <member name="P:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.NewItems">
  34059. <summary>
  34060. The items affected by the change.
  34061. </summary>
  34062. </member>
  34063. <member name="P:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.OldItems">
  34064. <summary>
  34065. The old items affected by the change (for Replace events).
  34066. </summary>
  34067. </member>
  34068. <member name="P:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.NewStartingIndex">
  34069. <summary>
  34070. The index where the change occurred.
  34071. </summary>
  34072. </member>
  34073. <member name="P:PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs.OldStartingIndex">
  34074. <summary>
  34075. The old index where the change occurred (for Move events).
  34076. </summary>
  34077. </member>
  34078. </members>
  34079. </doc>