The BlowfishCipher type exposes the following members.
Back to Top
Back to Top
Methods
Name | Description | |
---|---|---|
BCrypt |
Uses the cipher to generate a BCrypt hash.
| |
BCrypt( Byte , Byte , Int32) |
Uses the given key, salt, and cost to generate a BCrypt hash.
| |
BCrypt( Byte , Byte , Int32, EksBlowfishKeyExpansionFlags) |
Uses the given key, salt, and cost to generate a BCrypt hash.
Flags may modify the key expansion.
| |
Create |
Creates a Blowfish cipher using the provided key.
| |
CreateEks( Byte , Byte , Int32) |
Performs an Expensive Key Schedule (EKS) Blowfish key expansion and
creates a Blowfish cipher using the result.
| |
CreateEks( Byte , Byte , Int32, EksBlowfishKeyExpansionFlags) |
Performs an Expensive Key Schedule (EKS) Blowfish key expansion and
creates a Blowfish cipher using the result. Flags may modify the key expansion.
| |
Decipher( Byte , Int32) |
Reverses the encipherment of eight bytes of data in-place.
| |
Decipher(UInt32 , UInt32 ) |
Reverses the encipherment of eight bytes of data.
| |
Decipher( Byte , Int32, Byte , Int32) |
Reverses the encipherment of eight bytes of data from one buffer and places the result in another buffer.
| |
Dispose |
Clears all memory used by the cipher.
| |
Encipher( Byte , Int32) |
Enciphers eight bytes of data in-place.
| |
Encipher(UInt32 , UInt32 ) |
Enciphers eight bytes of data.
| |
Encipher( Byte , Int32, Byte , Int32) |
Enciphers eight bytes of data from one buffer and places the result in another buffer.
|
Properties
Name | Description | |
---|---|---|
BCryptLength |
The number of bytes returned by BCrypt .
| |
BCryptMagic |
The special string used encrypted in the BCrypt algorithm.
| |
IsKeyWeak |
A Blowfish key is weak if one of its S-boxes has a duplicate entry.
See http://www.schneier.com/paper-blowfish-oneyear.html for more information.
|
See Also