Cuemon .NET Framework
CyclicRedundancyCheck Class Members
Fields  Properties  Methods 


The following tables list the members exposed by CyclicRedundancyCheck.

Protected Constructors
 NameDescription
Protected ConstructorCyclicRedundancyCheck ConstructorOverloaded.   
Top
Protected Fields
 NameDescription
Protected FieldHashSizeValueRepresents the size, in bits, of the computed hash code. (Inherited from System.Security.Cryptography.HashAlgorithm)
Protected FieldStateRepresents the state of the hash computation. (Inherited from System.Security.Cryptography.HashAlgorithm)
Top
Public Properties
 NameDescription
Public PropertyCanReuseTransformGets a value indicating whether the current transform can be reused. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public PropertyCanTransformMultipleBlocksWhen overridden in a derived class, gets a value indicating whether multiple blocks can be transformed. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public PropertyDefaultSeedGets the CRC default seed value.  
Public PropertyHashGets the value of the computed hash code. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public PropertyHashSizeGets the size, in bits, of the computed hash code. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public PropertyInputBlockSizeWhen overridden in a derived class, gets the input block size. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public PropertyOutputBlockSizeWhen overridden in a derived class, gets the output block size. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public PropertyPolynomialGets the CRC polynomial hexadecimal value equal to CRC implementation and Representation.  
Public PropertyRepresentationGets the CRC polynomial generator representation.  
Top
Protected Properties
 NameDescription
Protected PropertyHashCoreResultGets or sets the resolved hash result.  
Protected PropertyLookupTableGets the lookup table for the associated CRC implementation.  
Top
Public Methods
 NameDescription
Public MethodClearReleases all resources used by the System.Security.Cryptography.HashAlgorithm class. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public MethodComputeHashOverloaded. Computes the hash value for the specified System.IO.Stream object. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public MethodDisposeOverloaded. Releases all resources used by the current instance of the System.Security.Cryptography.HashAlgorithm class. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public MethodInitializeOverridden. Initializes an implementation of the System.Security.Cryptography.HashAlgorithm class.  
Public MethodTransformBlockComputes the hash value for the specified region of the input byte array and copies the specified region of the input byte array to the specified region of the output byte array. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public MethodTransformFinalBlockComputes the hash value for the specified region of the specified byte array. (Inherited from System.Security.Cryptography.HashAlgorithm)
Top
Protected Methods
 NameDescription
Protected MethodHashCoreWhen overridden in a derived class, routes data written to the object into the hash algorithm for computing the hash. (Inherited from System.Security.Cryptography.HashAlgorithm)
Protected MethodHashFinalWhen overridden in a derived class, finalizes the hash computation after the last data is processed by the cryptographic stream object. (Inherited from System.Security.Cryptography.HashAlgorithm)
Protected MethodInitializePolynomialInitializes the implementation of the polynomial representation details.  
Protected MethodInitializePolynomialLookupTableInitializes the implementation details of a CyclicRedundancyCheck related polynomial lookup table.  
Top
See Also

Reference

CyclicRedundancyCheck Class
Cuemon.Security.Cryptography Namespace

 

 


| Cuemon is licensed under a The MIT License (MIT)



© 2009-2015 Weubphoria. All Rights Reserved.

Documentation made easy with Document! X by Innovasys

Send Feedback