25112102 单位改到表格表头

This commit is contained in:
moxiliang
2025-11-21 10:50:27 +08:00
parent b5f208b3ca
commit 915fbf594b
641 changed files with 1546305 additions and 0 deletions

Binary file not shown.

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.8 KiB

View File

@@ -0,0 +1,23 @@
The MIT License (MIT)
Copyright (c) .NET Foundation and Contributors
All rights reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.

View File

@@ -0,0 +1,957 @@
.NET Runtime uses third-party libraries or other resources that may be
distributed under licenses different than the .NET Runtime software.
In the event that we accidentally failed to list a required notice, please
bring it to our attention. Post an issue or email us:
dotnet@microsoft.com
The attached notices are provided for information only.
License notice for ASP.NET
-------------------------------
Copyright (c) .NET Foundation. All rights reserved.
Licensed under the Apache License, Version 2.0.
Available at
https://github.com/dotnet/aspnetcore/blob/main/LICENSE.txt
License notice for Slicing-by-8
-------------------------------
http://sourceforge.net/projects/slicing-by-8/
Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved
This software program is licensed subject to the BSD License, available at
http://www.opensource.org/licenses/bsd-license.html.
License notice for Unicode data
-------------------------------
https://www.unicode.org/license.html
Copyright © 1991-2020 Unicode, Inc. All rights reserved.
Distributed under the Terms of Use in https://www.unicode.org/copyright.html.
Permission is hereby granted, free of charge, to any person obtaining
a copy of the Unicode data files and any associated documentation
(the "Data Files") or Unicode software and any associated documentation
(the "Software") to deal in the Data Files or Software
without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, and/or sell copies of
the Data Files or Software, and to permit persons to whom the Data Files
or Software are furnished to do so, provided that either
(a) this copyright and permission notice appear with all copies
of the Data Files or Software, or
(b) this copyright and permission notice appear in associated
Documentation.
THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OF THIRD PARTY RIGHTS.
IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS
NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL
DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THE DATA FILES OR SOFTWARE.
Except as contained in this notice, the name of a copyright holder
shall not be used in advertising or otherwise to promote the sale,
use or other dealings in these Data Files or Software without prior
written authorization of the copyright holder.
License notice for Zlib
-----------------------
https://github.com/madler/zlib
http://zlib.net/zlib_license.html
/* zlib.h -- interface of the 'zlib' general purpose compression library
version 1.2.11, January 15th, 2017
Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler
This software is provided 'as-is', without any express or implied
warranty. In no event will the authors be held liable for any damages
arising from the use of this software.
Permission is granted to anyone to use this software for any purpose,
including commercial applications, and to alter it and redistribute it
freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not
claim that you wrote the original software. If you use this software
in a product, an acknowledgment in the product documentation would be
appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be
misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
Jean-loup Gailly Mark Adler
jloup@gzip.org madler@alumni.caltech.edu
*/
License notice for Mono
-------------------------------
http://www.mono-project.com/docs/about-mono/
Copyright (c) .NET Foundation Contributors
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the Software), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
License notice for International Organization for Standardization
-----------------------------------------------------------------
Portions (C) International Organization for Standardization 1986:
Permission to copy in any form is granted for use with
conforming SGML systems and applications as defined in
ISO 8879, provided this notice is included in all copies.
License notice for Intel
------------------------
"Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
License notice for Xamarin and Novell
-------------------------------------
Copyright (c) 2015 Xamarin, Inc (http://www.xamarin.com)
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
Copyright (c) 2011 Novell, Inc (http://www.novell.com)
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
Third party notice for W3C
--------------------------
"W3C SOFTWARE AND DOCUMENT NOTICE AND LICENSE
Status: This license takes effect 13 May, 2015.
This work is being provided by the copyright holders under the following license.
License
By obtaining and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions.
Permission to copy, modify, and distribute this work, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the work or portions thereof, including modifications:
The full text of this NOTICE in a location viewable to users of the redistributed or derivative work.
Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software and Document Short Notice should be included.
Notice of any changes or modifications, through a copyright statement on the new code or document such as "This software or document includes material copied from or derived from [title and URI of the W3C document]. Copyright © [YEAR] W3C® (MIT, ERCIM, Keio, Beihang)."
Disclaimers
THIS WORK IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENT WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS.
COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENT.
The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the work without specific, written prior permission. Title to copyright in this work will at all times remain with copyright holders."
License notice for Bit Twiddling Hacks
--------------------------------------
Bit Twiddling Hacks
By Sean Eron Anderson
seander@cs.stanford.edu
Individually, the code snippets here are in the public domain (unless otherwise
noted) — feel free to use them however you please. The aggregate collection and
descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are
distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and
without even the implied warranty of merchantability or fitness for a particular
purpose.
License notice for Brotli
--------------------------------------
Copyright (c) 2009, 2010, 2013-2016 by the Brotli Authors.
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
compress_fragment.c:
Copyright (c) 2011, Google Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above
copyright notice, this list of conditions and the following disclaimer
in the documentation and/or other materials provided with the
distribution.
* Neither the name of Google Inc. nor the names of its
contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
decode_fuzzer.c:
Copyright (c) 2015 The Chromium Authors. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above
copyright notice, this list of conditions and the following disclaimer
in the documentation and/or other materials provided with the
distribution.
* Neither the name of Google Inc. nor the names of its
contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE."
License notice for Json.NET
-------------------------------
https://github.com/JamesNK/Newtonsoft.Json/blob/master/LICENSE.md
The MIT License (MIT)
Copyright (c) 2007 James Newton-King
Permission is hereby granted, free of charge, to any person obtaining a copy of
this software and associated documentation files (the "Software"), to deal in
the Software without restriction, including without limitation the rights to
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
License notice for vectorized base64 encoding / decoding
--------------------------------------------------------
Copyright (c) 2005-2007, Nick Galbreath
Copyright (c) 2013-2017, Alfred Klomp
Copyright (c) 2015-2017, Wojciech Mula
Copyright (c) 2016-2017, Matthieu Darbois
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
- Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
- Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
License notice for RFC 3492
---------------------------
The punycode implementation is based on the sample code in RFC 3492
Copyright (C) The Internet Society (2003). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
License notice for Algorithm from Internet Draft document "UUIDs and GUIDs"
---------------------------------------------------------------------------
Copyright (c) 1990- 1993, 1996 Open Software Foundation, Inc.
Copyright (c) 1989 by Hewlett-Packard Company, Palo Alto, Ca. &
Digital Equipment Corporation, Maynard, Mass.
To anyone who acknowledges that this file is provided "AS IS"
without any express or implied warranty: permission to use, copy,
modify, and distribute this file for any purpose is hereby
granted without fee, provided that the above copyright notices and
this notice appears in all source code copies, and that none of
the names of Open Software Foundation, Inc., Hewlett-Packard
Company, or Digital Equipment Corporation be used in advertising
or publicity pertaining to distribution of the software without
specific, written prior permission. Neither Open Software
Foundation, Inc., Hewlett-Packard Company, Microsoft, nor Digital Equipment
Corporation makes any representations about the suitability of
this software for any purpose.
Copyright(C) The Internet Society 1997. All Rights Reserved.
This document and translations of it may be copied and furnished to others,
and derivative works that comment on or otherwise explain it or assist in
its implementation may be prepared, copied, published and distributed, in
whole or in part, without restriction of any kind, provided that the above
copyright notice and this paragraph are included on all such copies and
derivative works.However, this document itself may not be modified in any
way, such as by removing the copyright notice or references to the Internet
Society or other Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for copyrights
defined in the Internet Standards process must be followed, or as required
to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked
by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an "AS IS"
basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE
DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY
RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE.
License notice for Algorithm from RFC 4122 -
A Universally Unique IDentifier (UUID) URN Namespace
----------------------------------------------------
Copyright (c) 1990- 1993, 1996 Open Software Foundation, Inc.
Copyright (c) 1989 by Hewlett-Packard Company, Palo Alto, Ca. &
Digital Equipment Corporation, Maynard, Mass.
Copyright (c) 1998 Microsoft.
To anyone who acknowledges that this file is provided "AS IS"
without any express or implied warranty: permission to use, copy,
modify, and distribute this file for any purpose is hereby
granted without fee, provided that the above copyright notices and
this notice appears in all source code copies, and that none of
the names of Open Software Foundation, Inc., Hewlett-Packard
Company, Microsoft, or Digital Equipment Corporation be used in
advertising or publicity pertaining to distribution of the software
without specific, written prior permission. Neither Open Software
Foundation, Inc., Hewlett-Packard Company, Microsoft, nor Digital
Equipment Corporation makes any representations about the
suitability of this software for any purpose."
License notice for The LLVM Compiler Infrastructure
---------------------------------------------------
Developed by:
LLVM Team
University of Illinois at Urbana-Champaign
http://llvm.org
Permission is hereby granted, free of charge, to any person obtaining a copy of
this software and associated documentation files (the "Software"), to deal with
the Software without restriction, including without limitation the rights to
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
of the Software, and to permit persons to whom the Software is furnished to do
so, subject to the following conditions:
* Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimers.
* Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimers in the
documentation and/or other materials provided with the distribution.
* Neither the names of the LLVM Team, University of Illinois at
Urbana-Champaign, nor the names of its contributors may be used to
endorse or promote products derived from this Software without specific
prior written permission.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
CONTRIBUTORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS WITH THE
SOFTWARE.
License notice for Bob Jenkins
------------------------------
By Bob Jenkins, 1996. bob_jenkins@burtleburtle.net. You may use this
code any way you wish, private, educational, or commercial. It's free.
License notice for Greg Parker
------------------------------
Greg Parker gparker@cs.stanford.edu December 2000
This code is in the public domain and may be copied or modified without
permission.
License notice for libunwind based code
----------------------------------------
Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the
"Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to
the following conditions:
The above copyright notice and this permission notice shall be
included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
License notice for Printing Floating-Point Numbers (Dragon4)
------------------------------------------------------------
/******************************************************************************
Copyright (c) 2014 Ryan Juckett
http://www.ryanjuckett.com/
This software is provided 'as-is', without any express or implied
warranty. In no event will the authors be held liable for any damages
arising from the use of this software.
Permission is granted to anyone to use this software for any purpose,
including commercial applications, and to alter it and redistribute it
freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not
claim that you wrote the original software. If you use this software
in a product, an acknowledgment in the product documentation would be
appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be
misrepresented as being the original software.
3. This notice may not be removed or altered from any source
distribution.
******************************************************************************/
License notice for Printing Floating-point Numbers (Grisu3)
-----------------------------------------------------------
Copyright 2012 the V8 project authors. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above
copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided
with the distribution.
* Neither the name of Google Inc. nor the names of its
contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
License notice for xxHash
-------------------------
xxHash Library
Copyright (c) 2012-2014, Yann Collet
All rights reserved.
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
* Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this
list of conditions and the following disclaimer in the documentation and/or
other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
License notice for Berkeley SoftFloat Release 3e
------------------------------------------------
https://github.com/ucb-bar/berkeley-softfloat-3
https://github.com/ucb-bar/berkeley-softfloat-3/blob/master/COPYING.txt
License for Berkeley SoftFloat Release 3e
John R. Hauser
2018 January 20
The following applies to the whole of SoftFloat Release 3e as well as to
each source file individually.
Copyright 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018 The Regents of the
University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice,
this list of conditions, and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions, and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors
may be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS", AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ARE
DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
License notice for xoshiro RNGs
--------------------------------
Written in 2018 by David Blackman and Sebastiano Vigna (vigna@acm.org)
To the extent possible under law, the author has dedicated all copyright
and related and neighboring rights to this software to the public domain
worldwide. This software is distributed without any warranty.
See <http://creativecommons.org/publicdomain/zero/1.0/>.
License for fastmod (https://github.com/lemire/fastmod) and ibm-fpgen (https://github.com/nigeltao/parse-number-fxx-test-data)
--------------------------------------
Copyright 2018 Daniel Lemire
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
License notice for The C++ REST SDK
-----------------------------------
C++ REST SDK
The MIT License (MIT)
Copyright (c) Microsoft Corporation
All rights reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of
this software and associated documentation files (the "Software"), to deal in
the Software without restriction, including without limitation the rights to
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
License notice for MessagePack-CSharp
-------------------------------------
MessagePack for C#
MIT License
Copyright (c) 2017 Yoshifumi Kawai
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
License notice for lz4net
-------------------------------------
lz4net
Copyright (c) 2013-2017, Milosz Krajewski
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
License notice for Nerdbank.Streams
-----------------------------------
The MIT License (MIT)
Copyright (c) Andrew Arnott
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
License notice for RapidJSON
----------------------------
Tencent is pleased to support the open source community by making RapidJSON available.
Copyright (C) 2015 THL A29 Limited, a Tencent company, and Milo Yip. All rights reserved.
Licensed under the MIT License (the "License"); you may not use this file except
in compliance with the License. You may obtain a copy of the License at
http://opensource.org/licenses/MIT
Unless required by applicable law or agreed to in writing, software distributed
under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
CONDITIONS OF ANY KIND, either express or implied. See the License for the
specific language governing permissions and limitations under the License.
License notice for DirectX Math Library
---------------------------------------
https://github.com/microsoft/DirectXMath/blob/master/LICENSE
The MIT License (MIT)
Copyright (c) 2011-2020 Microsoft Corp
Permission is hereby granted, free of charge, to any person obtaining a copy of this
software and associated documentation files (the "Software"), to deal in the Software
without restriction, including without limitation the rights to use, copy, modify,
merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to the following
conditions:
The above copyright notice and this permission notice shall be included in all copies
or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE
OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
License notice for ldap4net
---------------------------
The MIT License (MIT)
Copyright (c) 2018 Alexander Chermyanin
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
License notice for vectorized sorting code
------------------------------------------
MIT License
Copyright (c) 2020 Dan Shechter
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
License notice for musl
-----------------------
musl as a whole is licensed under the following standard MIT license:
Copyright © 2005-2020 Rich Felker, et al.
Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the
"Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to
the following conditions:
The above copyright notice and this permission notice shall be
included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
License notice for "Faster Unsigned Division by Constants"
------------------------------
Reference implementations of computing and using the "magic number" approach to dividing
by constants, including codegen instructions. The unsigned division incorporates the
"round down" optimization per ridiculous_fish.
This is free and unencumbered software. Any copyright is dedicated to the Public Domain.
License notice for mimalloc
-----------------------------------
MIT License
Copyright (c) 2019 Microsoft Corporation, Daan Leijen
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
License for remote stack unwind (https://github.com/llvm/llvm-project/blob/main/lldb/source/Symbol/CompactUnwindInfo.cpp)
--------------------------------------
Copyright 2019 LLVM Project
Licensed under the Apache License, Version 2.0 (the "License") with LLVM Exceptions;
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
https://llvm.org/LICENSE.txt
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.

View File

@@ -0,0 +1,6 @@
<Project InitialTargets="NETStandardCompatError_System_Security_Cryptography_Xml_netcoreapp3_1">
<Target Name="NETStandardCompatError_System_Security_Cryptography_Xml_netcoreapp3_1"
Condition="'$(SuppressTfmSupportBuildWarnings)' == ''">
<Error Text="System.Security.Cryptography.Xml doesn't support $(TargetFramework). Consider updating your TargetFramework to netcoreapp3.1 or later." />
</Target>
</Project>

View File

@@ -0,0 +1,336 @@
<?xml version="1.0"?>
<doc>
<assembly>
<name>System.Security.Cryptography.Xml</name>
</assembly>
<members>
<member name="P:System.SR.ArgumentOutOfRange_Index">
<summary>Index was out of range. Must be non-negative and less than the size of the collection.</summary>
</member>
<member name="P:System.SR.Arg_EmptyOrNullString">
<summary>String cannot be empty or null.</summary>
</member>
<member name="P:System.SR.Cryptography_Partial_Chain">
<summary>A certificate chain could not be built to a trusted root authority.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_BadWrappedKeySize">
<summary>Bad wrapped key size.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CipherValueElementRequired">
<summary>A Cipher Data element should have either a CipherValue or a CipherReference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreateHashAlgorithmFailed">
<summary>Could not create hash algorithm object.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreateTransformFailed">
<summary>Could not create the XML transformation identified by the URI {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreatedKeyFailed">
<summary>Failed to create signing key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_DigestMethodRequired">
<summary>A DigestMethod must be specified on a Reference prior to generating XML.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_DigestValueRequired">
<summary>A Reference must contain a DigestValue.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_EnvelopedSignatureRequiresContext">
<summary>An XmlDocument context is required for enveloped transforms.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidElement">
<summary>Malformed element {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidEncryptionProperty">
<summary>Malformed encryption property element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidKeySize">
<summary>The key size should be a non negative integer.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidReference">
<summary>Malformed reference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidSignatureLength">
<summary>The length of the signature with a MAC should be less than the hash output length.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidSignatureLength2">
<summary>The length in bits of the signature with a MAC should be a multiple of 8.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidX509IssuerSerialNumber">
<summary>X509 issuer serial number is invalid.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_KeyInfoRequired">
<summary>A KeyInfo element is required to check the signature.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_KW_BadKeySize">
<summary>The length of the encrypted data in Key Wrap is either 32, 40 or 48 bytes.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_LoadKeyFailed">
<summary>Signing key is not loaded.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingAlgorithm">
<summary>Symmetric algorithm is not specified.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingCipherData">
<summary>Cipher data is not specified.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingDecryptionKey">
<summary>Unable to retrieve the decryption key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingEncryptionKey">
<summary>Unable to retrieve the encryption key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_NotSupportedCryptographicTransform">
<summary>The specified cryptographic transform is not supported.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_ReferenceElementRequired">
<summary>At least one Reference element is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_ReferenceTypeRequired">
<summary>The Reference type must be set in an EncryptedReference object.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SelfReferenceRequiresContext">
<summary>An XmlDocument context is required to resolve the Reference Uri {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureDescriptionNotCreated">
<summary>SignatureDescription could not be created for the signature algorithm supplied.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureMethodKeyMismatch">
<summary>The key does not fit the SignatureMethod.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureMethodRequired">
<summary>A signature method is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureValueRequired">
<summary>Signature requires a SignatureValue.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignedInfoRequired">
<summary>Signature requires a SignedInfo.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_TransformIncorrectInputType">
<summary>The input type was invalid for this transform.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_IncorrectObjectType">
<summary>Type of input object is invalid.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UnknownTransform">
<summary>Unknown transform has been encountered.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriNotResolved">
<summary>Unable to resolve Uri {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriNotSupported">
<summary>The specified Uri is not supported.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriRequired">
<summary>A Uri attribute is required for a CipherReference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingContext">
<summary>Null Context property encountered.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingIRelDecryptor">
<summary>IRelDecryptor is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingIssuer">
<summary>Issuer node is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingLicence">
<summary>License node is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlUnableToDecryptGrant">
<summary>Unable to decrypt grant content.</summary>
</member>
<member name="P:System.SR.NotSupported_KeyAlgorithm">
<summary>The certificate key algorithm is not supported.</summary>
</member>
<member name="P:System.SR.Log_ActualHashValue">
<summary>Actual hash value: {0}</summary>
</member>
<member name="P:System.SR.Log_BeginCanonicalization">
<summary>Beginning canonicalization using "{0}" ({1}).</summary>
</member>
<member name="P:System.SR.Log_BeginSignatureComputation">
<summary>Beginning signature computation.</summary>
</member>
<member name="P:System.SR.Log_BeginSignatureVerification">
<summary>Beginning signature verification.</summary>
</member>
<member name="P:System.SR.Log_BuildX509Chain">
<summary>Building and verifying the X509 chain for certificate {0}.</summary>
</member>
<member name="P:System.SR.Log_CanonicalizationSettings">
<summary>Canonicalization transform is using resolver {0} and base URI "{1}".</summary>
</member>
<member name="P:System.SR.Log_CanonicalizedOutput">
<summary>Output of canonicalization transform: {0}</summary>
</member>
<member name="P:System.SR.Log_CertificateChain">
<summary>Certificate chain:</summary>
</member>
<member name="P:System.SR.Log_CheckSignatureFormat">
<summary>Checking signature format using format validator "[{0}] {1}.{2}".</summary>
</member>
<member name="P:System.SR.Log_CheckSignedInfo">
<summary>Checking signature on SignedInfo with id "{0}".</summary>
</member>
<member name="P:System.SR.Log_FormatValidationSuccessful">
<summary>Signature format validation was successful.</summary>
</member>
<member name="P:System.SR.Log_FormatValidationNotSuccessful">
<summary>Signature format validation failed.</summary>
</member>
<member name="P:System.SR.Log_KeyUsages">
<summary>Found key usages "{0}" in extension {1} on certificate {2}.</summary>
</member>
<member name="P:System.SR.Log_NoNamespacesPropagated">
<summary>No namespaces are being propagated.</summary>
</member>
<member name="P:System.SR.Log_PropagatingNamespace">
<summary>Propagating namespace {0}="{1}".</summary>
</member>
<member name="P:System.SR.Log_RawSignatureValue">
<summary>Raw signature: {0}</summary>
</member>
<member name="P:System.SR.Log_ReferenceHash">
<summary>Reference {0} hashed with "{1}" ({2}) has hash value {3}, expected hash value {4}.</summary>
</member>
<member name="P:System.SR.Log_RevocationMode">
<summary>Revocation mode for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_RevocationFlag">
<summary>Revocation flag for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_SigningAsymmetric">
<summary>Calculating signature with key {0} using signature description {1}, hash algorithm {2}, and asymmetric signature formatter {3}.</summary>
</member>
<member name="P:System.SR.Log_SigningHmac">
<summary>Calculating signature using keyed hash algorithm {0}.</summary>
</member>
<member name="P:System.SR.Log_SigningReference">
<summary>Hashing reference {0}, Uri "{1}", Id "{2}", Type "{3}" with hash algorithm "{4}" ({5}).</summary>
</member>
<member name="P:System.SR.Log_TransformedReferenceContents">
<summary>Transformed reference contents: {0}</summary>
</member>
<member name="P:System.SR.Log_UnsafeCanonicalizationMethod">
<summary>Canonicalization method "{0}" is not on the safe list. Safe canonicalization methods are: {1}.</summary>
</member>
<member name="P:System.SR.Log_UrlTimeout">
<summary>URL retrieval timeout for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed">
<summary>Verification failed checking {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_References">
<summary>references</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_SignedInfo">
<summary>SignedInfo</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_X509Chain">
<summary>X509 chain verification</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_X509KeyUsage">
<summary>X509 key usage verification</summary>
</member>
<member name="P:System.SR.Log_VerificationFlag">
<summary>Verification flags for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationTime">
<summary>Verification time for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationWithKeySuccessful">
<summary>Verification with key {0} was successful.</summary>
</member>
<member name="P:System.SR.Log_VerificationWithKeyNotSuccessful">
<summary>Verification with key {0} was not successful.</summary>
</member>
<member name="P:System.SR.Log_VerifyReference">
<summary>Processing reference {0}, Uri "{1}", Id "{2}", Type "{3}".</summary>
</member>
<member name="P:System.SR.Log_VerifySignedInfoAsymmetric">
<summary>Verifying SignedInfo using key {0}, signature description {1}, hash algorithm {2}, and asymmetric signature deformatter {3}.</summary>
</member>
<member name="P:System.SR.Log_VerifySignedInfoHmac">
<summary>Verifying SignedInfo using keyed hash algorithm {0}.</summary>
</member>
<member name="P:System.SR.Log_X509ChainError">
<summary>Error building X509 chain: {0}: {1}.</summary>
</member>
<member name="P:System.SR.Log_XmlContext">
<summary>Using context: {0}</summary>
</member>
<member name="P:System.SR.Log_SignedXmlRecursionLimit">
<summary>Signed xml recursion limit hit while trying to decrypt the key. Reference {0} hashed with "{1}" and ({2}).</summary>
</member>
<member name="P:System.SR.Log_UnsafeTransformMethod">
<summary>Transform method "{0}" is not on the safe list. Safe transform methods are: {1}.</summary>
</member>
<member name="P:System.SR.ElementCombinationMissing">
<summary>{0} and {1} can only occur in combination</summary>
</member>
<member name="P:System.SR.ElementMissing">
<summary>{0} is missing</summary>
</member>
<member name="P:System.SR.MustContainChildElement">
<summary>{0} must contain child element {1}</summary>
</member>
<member name="P:System.SR.WrongRootElement">
<summary>Root element must be {0} element in namespace {1}</summary>
</member>
<member name="T:System.Runtime.Versioning.OSPlatformAttribute">
<summary>
Base type for all platform-specific API attributes.
</summary>
</member>
<member name="T:System.Runtime.Versioning.TargetPlatformAttribute">
<summary>
Records the platform that the project targeted.
</summary>
</member>
<member name="T:System.Runtime.Versioning.SupportedOSPlatformAttribute">
<summary>
Records the operating system (and minimum version) that supports an API. Multiple attributes can be
applied to indicate support on multiple operating systems.
</summary>
<remarks>
Callers can apply a <see cref="T:System.Runtime.Versioning.SupportedOSPlatformAttribute" />
or use guards to prevent calls to APIs on unsupported operating systems.
A given platform should only be specified once.
</remarks>
</member>
<member name="T:System.Runtime.Versioning.UnsupportedOSPlatformAttribute">
<summary>
Marks APIs that were removed in a given operating system version.
</summary>
<remarks>
Primarily used by OS bindings to indicate APIs that are only available in
earlier versions.
</remarks>
</member>
<member name="T:System.Runtime.Versioning.SupportedOSPlatformGuardAttribute">
<summary>
Annotates a custom guard field, property or method with a supported platform name and optional version.
Multiple attributes can be applied to indicate guard for multiple supported platforms.
</summary>
<remarks>
Callers can apply a <see cref="T:System.Runtime.Versioning.SupportedOSPlatformGuardAttribute" /> to a field, property or method
and use that field, property or method in a conditional or assert statements in order to safely call platform specific APIs.
The type of the field or property should be boolean, the method return type should be boolean in order to be used as platform guard.
</remarks>
</member>
<member name="T:System.Runtime.Versioning.UnsupportedOSPlatformGuardAttribute">
<summary>
Annotates the custom guard field, property or method with an unsupported platform name and optional version.
Multiple attributes can be applied to indicate guard for multiple unsupported platforms.
</summary>
<remarks>
Callers can apply a <see cref="T:System.Runtime.Versioning.UnsupportedOSPlatformGuardAttribute" /> to a field, property or method
and use that field, property or method in a conditional or assert statements as a guard to safely call APIs unsupported on those platforms.
The type of the field or property should be boolean, the method return type should be boolean in order to be used as platform guard.
</remarks>
</member>
</members>
</doc>

View File

@@ -0,0 +1,713 @@
<?xml version="1.0"?>
<doc>
<assembly>
<name>System.Security.Cryptography.Xml</name>
</assembly>
<members>
<member name="T:System.Security.Cryptography.Xml.CryptoSignedXmlRecursionException">
<summary>
This exception helps catch the signed XML recursion limit error.
This is being caught in the SignedXml class while computing the
hash. ComputeHash can throw different kind of exceptions.
This unique exception helps catch the recursion limit issue.
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.DSAKeyValue.GetXml">
<summary>
Create an XML representation.
</summary>
<remarks>
Based upon https://www.w3.org/TR/xmldsig-core/#sec-DSAKeyValue.
</remarks>
<returns>
An <see cref="T:System.Xml.XmlElement"/> containing the XML representation.
</returns>
</member>
<member name="M:System.Security.Cryptography.Xml.DSAKeyValue.LoadXml(System.Xml.XmlElement)">
<summary>
Deserialize from the XML representation.
</summary>
<remarks>
Based upon https://www.w3.org/TR/xmldsig-core/#sec-DSAKeyValue.
</remarks>
<param name="value">
An <see cref="T:System.Xml.XmlElement"/> containing the XML representation. This cannot be null.
</param>
<exception cref="T:System.ArgumentNullException">
<paramref name="value"/> cannot be null.
</exception>
<exception cref="T:System.Security.Cryptography.CryptographicException">
The XML has the incorrect schema or the DSA parameters are invalid.
</exception>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptedXml.IsOverXmlDsigRecursionLimit">
<summary>
This method validates the _xmlDsigSearchDepthCounter counter
if the counter is over the limit defined by admin or developer.
</summary>
<returns>returns true if the limit has reached otherwise false</returns>
</member>
<member name="P:System.Security.Cryptography.Xml.EncryptedXml.XmlDSigSearchDepth">
<summary>
Gets / Sets the max limit for recursive search of encryption key in signed XML
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#Add(System.Object)">
<internalonly/>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#Contains(System.Object)">
<internalonly/>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#IndexOf(System.Object)">
<internalonly/>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#Insert(System.Int32,System.Object)">
<internalonly/>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#Remove(System.Object)">
<internalonly/>
</member>
<member name="P:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#Item(System.Int32)">
<internalonly/>
</member>
<member name="P:System.Security.Cryptography.Xml.ReferenceList.System#Collections#IList#Item(System.Int32)">
<internalonly/>
</member>
<member name="M:System.Security.Cryptography.Xml.RSAKeyValue.GetXml">
<summary>
Create an XML representation.
</summary>
<remarks>
Based upon https://www.w3.org/TR/xmldsig-core/#sec-RSAKeyValue.
</remarks>
<returns>
An <see cref="T:System.Xml.XmlElement"/> containing the XML representation.
</returns>
</member>
<member name="M:System.Security.Cryptography.Xml.RSAKeyValue.LoadXml(System.Xml.XmlElement)">
<summary>
Deserialize from the XML representation.
</summary>
<remarks>
Based upon https://www.w3.org/TR/xmldsig-core/#sec-RSAKeyValue.
</remarks>
<param name="value">
An <see cref="T:System.Xml.XmlElement"/> containing the XML representation. This cannot be null.
</param>
<exception cref="T:System.ArgumentNullException">
<paramref name="value"/> cannot be null.
</exception>
<exception cref="T:System.Security.Cryptography.CryptographicException">
The XML has the incorrect schema or the RSA parameters are invalid.
</exception>
</member>
<member name="P:System.Security.Cryptography.Xml.SignedXml.SigningKeyName">
<internalonly/>
</member>
<member name="T:System.Security.Cryptography.Xml.SignedXmlDebugLog">
<summary>
Trace support for debugging issues signing and verifying XML signatures.
</summary>
</member>
<member name="T:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent">
<summary>
Types of events that are logged to the debug log
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.BeginCanonicalization">
<summary>
Canonicalization of input XML has begun
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.BeginCheckSignatureFormat">
<summary>
Verification of the signature format itself is beginning
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.BeginCheckSignedInfo">
<summary>
Verification of a signed info is beginning
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.BeginSignatureComputation">
<summary>
Signing is beginning
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.BeginSignatureVerification">
<summary>
Signature verification is beginning
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.CanonicalizedData">
<summary>
Input data has been transformed to its canonicalized form
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.FormatValidationResult">
<summary>
The result of signature format validation
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.NamespacePropagation">
<summary>
Namespaces are being propigated into the signature
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.ReferenceData">
<summary>
Output from a Reference
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.SignatureVerificationResult">
<summary>
The result of a signature verification
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.Signing">
<summary>
Calculating the final signature
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.SigningReference">
<summary>
A reference is being hashed
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.VerificationFailure">
<summary>
A signature has failed to verify
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.VerifyReference">
<summary>
Verify that a reference has the correct hash value
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.VerifySignedInfo">
<summary>
Verification is processing the SignedInfo section of the signature
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.X509Verification">
<summary>
Verification status on the x.509 certificate in use
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.UnsafeCanonicalizationMethod">
<summary>
The signature is being rejected by the signature format verifier due to having
a canonicalization algorithm which is not on the known valid list.
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.UnsafeTransformMethod">
<summary>
The signature is being rejected by the signature verifier due to having
a transform algorithm which is not on the known valid list.
</summary>
</member>
<member name="P:System.Security.Cryptography.Xml.SignedXmlDebugLog.InformationLoggingEnabled">
<summary>
Check to see if logging should be done in this process
</summary>
</member>
<member name="P:System.Security.Cryptography.Xml.SignedXmlDebugLog.VerboseLoggingEnabled">
<summary>
Check to see if verbose log messages should be generated
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.FormatBytes(System.Byte[])">
<summary>
Convert the byte array into a hex string
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.GetKeyName(System.Object)">
<summary>
Map a key to a string describing the key
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.GetObjectId(System.Object)">
<summary>
Map an object to a string describing the object
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.GetOidName(System.Security.Cryptography.Oid)">
<summary>
Map an OID to the friendliest name possible
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogBeginCanonicalization(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Transform)">
<summary>
Log that canonicalization has begun on input data
</summary>
<param name="signedXml">SignedXml object doing the signing or verification</param>
<param name="canonicalizationTransform">transform canonicalizing the input</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogBeginCheckSignatureFormat(System.Security.Cryptography.Xml.SignedXml,System.Func{System.Security.Cryptography.Xml.SignedXml,System.Boolean})">
<summary>
Log that we're going to be validating the signature format itself
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="formatValidator">Callback delegate which is being used for format verification</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogBeginCheckSignedInfo(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.SignedInfo)">
<summary>
Log that checking SignedInfo is beginning
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="signedInfo">SignedInfo object being verified</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogBeginSignatureComputation(System.Security.Cryptography.Xml.SignedXml,System.Xml.XmlElement)">
<summary>
Log that signature computation is beginning
</summary>
<param name="signedXml">SignedXml object doing the signing</param>
<param name="context">Context of the signature</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogBeginSignatureVerification(System.Security.Cryptography.Xml.SignedXml,System.Xml.XmlElement)">
<summary>
Log that signature verification is beginning
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="context">Context of the verification</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogCanonicalizedOutput(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Transform)">
<summary>
Log the canonicalized data
</summary>
<param name="signedXml">SignedXml object doing the signing or verification</param>
<param name="canonicalizationTransform">transform canonicalizing the input</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogFormatValidationResult(System.Security.Cryptography.Xml.SignedXml,System.Boolean)">
<summary>
Log that the signature format callback has rejected the signature
</summary>
<param name="signedXml">SignedXml object doing the signature verification</param>
<param name="result">result of the signature format verification</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogUnsafeCanonicalizationMethod(System.Security.Cryptography.Xml.SignedXml,System.String,System.Collections.Generic.IEnumerable{System.String})">
<summary>
Log that a signature is being rejected as having an invalid format due to its canonicalization
algorithm not being on the valid list.
</summary>
<param name="signedXml">SignedXml object doing the signature verification</param>
<param name="algorithm">Canonicalization algorithm</param>
<param name="validAlgorithms">List of valid canonicalization algorithms</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogUnsafeTransformMethod(System.Security.Cryptography.Xml.SignedXml,System.String,System.Collections.Generic.IEnumerable{System.String},System.Collections.Generic.IEnumerable{System.String})">
<summary>
Log that a signature is being rejected as having an invalid signature due to a transform
algorithm not being on the valid list.
</summary>
<param name="signedXml">SignedXml object doing the signature verification</param>
<param name="algorithm">Transform algorithm that was not allowed</param>
<param name="validC14nAlgorithms">The valid C14N algorithms</param>
<param name="validTransformAlgorithms">The valid C14N algorithms</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogNamespacePropagation(System.Security.Cryptography.Xml.SignedXml,System.Xml.XmlNodeList)">
<summary>
Log namespaces which are being propagated into the signature
</summary>
<param name="signedXml">SignedXml doing the signing or verification</param>
<param name="namespaces">namespaces being propagated</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogReferenceData(System.Security.Cryptography.Xml.Reference,System.IO.Stream)">
<summary>
Log the output of a reference
</summary>
<param name="reference">The reference being processed</param>
<param name="data">Stream containing the output of the reference</param>
<returns>Stream containing the output of the reference</returns>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogSigning(System.Security.Cryptography.Xml.SignedXml,System.Object,System.Security.Cryptography.SignatureDescription,System.Security.Cryptography.HashAlgorithm,System.Security.Cryptography.AsymmetricSignatureFormatter)">
<summary>
Log the computation of a signature value when signing with an asymmetric algorithm
</summary>
<param name="signedXml">SignedXml object calculating the signature</param>
<param name="key">key used for signing</param>
<param name="signatureDescription">signature description being used to create the signature</param>
<param name="hash">hash algorithm used to digest the output</param>
<param name="asymmetricSignatureFormatter">signature formatter used to do the signing</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogSigning(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.KeyedHashAlgorithm)">
<summary>
Log the computation of a signature value when signing with a keyed hash algorithm
</summary>
<param name="signedXml">SignedXml object calculating the signature</param>
<param name="key">key the signature is created with</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogSigningReference(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Reference)">
<summary>
Log the calculation of a hash value of a reference
</summary>
<param name="signedXml">SignedXml object driving the signature</param>
<param name="reference">Reference being hashed</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerificationFailure(System.Security.Cryptography.Xml.SignedXml,System.String)">
<summary>
Log the specific point where a signature is determined to not be verifiable
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="failureLocation">location that the signature was determined to be invalid</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerificationResult(System.Security.Cryptography.Xml.SignedXml,System.Object,System.Boolean)">
<summary>
Log the success or failure of a signature verification operation
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="key">public key used to verify the signature</param>
<param name="verified">true if the signature verified, false otherwise</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifyKeyUsage(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.X509Certificates.X509Certificate,System.Security.Cryptography.X509Certificates.X509KeyUsageExtension)">
<summary>
Log the check for appropriate X509 key usage
</summary>
<param name="signedXml">SignedXml doing the signature verification</param>
<param name="certificate">certificate having its key usages checked</param>
<param name="keyUsages">key usages being examined</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifyReference(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Reference)">
<summary>
Log that we are verifying a reference
</summary>
<param name="signedXml">SignedXMl object doing the verification</param>
<param name="reference">reference being verified</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifyReferenceHash(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Reference,System.Byte[],System.Byte[])">
<summary>
Log the hash comparison when verifying a reference
</summary>
<param name="signedXml">SignedXml object verifying the signature</param>
<param name="reference">reference being verified</param>
<param name="actualHash">actual hash value of the reference</param>
<param name="expectedHash">hash value the signature expected the reference to have</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifySignedInfo(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.AsymmetricAlgorithm,System.Security.Cryptography.SignatureDescription,System.Security.Cryptography.HashAlgorithm,System.Security.Cryptography.AsymmetricSignatureDeformatter,System.Byte[],System.Byte[])">
<summary>
Log the verification parameters when verifying the SignedInfo section of a signature using an
asymmetric key
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="key">key being used to verify the signed info</param>
<param name="signatureDescription">type of signature description class used</param>
<param name="hashAlgorithm">type of hash algorithm used</param>
<param name="asymmetricSignatureDeformatter">type of signature deformatter used</param>
<param name="actualHashValue">hash value of the signed info</param>
<param name="signatureValue">raw signature value</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifySignedInfo(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.KeyedHashAlgorithm,System.Byte[],System.Byte[])">
<summary>
Log the verification parameters when verifying the SignedInfo section of a signature using a
keyed hash algorithm
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="mac">hash algorithm doing the verification</param>
<param name="actualHashValue">hash value of the signed info</param>
<param name="signatureValue">raw signature value</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifyX509Chain(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.X509Certificates.X509Chain,System.Security.Cryptography.X509Certificates.X509Certificate)">
<summary>
Log that an X509 chain is being built for a certificate
</summary>
<param name="signedXml">SignedXml object building the chain</param>
<param name="chain">chain built for the certificate</param>
<param name="certificate">certificate having the chain built for it</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogSignedXmlRecursionLimit(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Reference)">
<summary>
Write information when user hits the Signed XML recursion depth limit issue.
This is helpful in debugging this kind of issues.
</summary>
<param name="signedXml">SignedXml object verifying the signature</param>
<param name="reference">reference being verified</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.WriteLine(System.Object,System.Diagnostics.TraceEventType,System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent,System.String)">
<summary>
Write data to the log
</summary>
<param name="source">object doing the trace</param>
<param name="eventType">severity of the debug event</param>
<param name="data">data being written</param>
<param name="eventId">type of event being traced</param>
</member>
<member name="M:System.Security.Cryptography.Xml.XmlDsigEnvelopedSignatureTransform.#ctor(System.Boolean)">
<internalonly/>
</member>
<member name="P:System.HexConverter.CharToHexLookup">
<summary>Map from an ASCII char to its hex value, e.g. arr['b'] == 11. 0xFF means it's not a hex digit.</summary>
</member>
<member name="P:System.SR.ArgumentOutOfRange_Index">
<summary>Index was out of range. Must be non-negative and less than the size of the collection.</summary>
</member>
<member name="P:System.SR.Arg_EmptyOrNullString">
<summary>String cannot be empty or null.</summary>
</member>
<member name="P:System.SR.Cryptography_Partial_Chain">
<summary>A certificate chain could not be built to a trusted root authority.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_BadWrappedKeySize">
<summary>Bad wrapped key size.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CipherValueElementRequired">
<summary>A Cipher Data element should have either a CipherValue or a CipherReference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreateHashAlgorithmFailed">
<summary>Could not create hash algorithm object.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreateTransformFailed">
<summary>Could not create the XML transformation identified by the URI {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreatedKeyFailed">
<summary>Failed to create signing key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_DigestMethodRequired">
<summary>A DigestMethod must be specified on a Reference prior to generating XML.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_DigestValueRequired">
<summary>A Reference must contain a DigestValue.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_EnvelopedSignatureRequiresContext">
<summary>An XmlDocument context is required for enveloped transforms.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidElement">
<summary>Malformed element {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidEncryptionProperty">
<summary>Malformed encryption property element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidKeySize">
<summary>The key size should be a non negative integer.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidReference">
<summary>Malformed reference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidSignatureLength">
<summary>The length of the signature with a MAC should be less than the hash output length.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidSignatureLength2">
<summary>The length in bits of the signature with a MAC should be a multiple of 8.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidX509IssuerSerialNumber">
<summary>X509 issuer serial number is invalid.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_KeyInfoRequired">
<summary>A KeyInfo element is required to check the signature.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_KW_BadKeySize">
<summary>The length of the encrypted data in Key Wrap is either 32, 40 or 48 bytes.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_LoadKeyFailed">
<summary>Signing key is not loaded.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingAlgorithm">
<summary>Symmetric algorithm is not specified.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingCipherData">
<summary>Cipher data is not specified.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingDecryptionKey">
<summary>Unable to retrieve the decryption key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingEncryptionKey">
<summary>Unable to retrieve the encryption key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_NotSupportedCryptographicTransform">
<summary>The specified cryptographic transform is not supported.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_ReferenceElementRequired">
<summary>At least one Reference element is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_ReferenceTypeRequired">
<summary>The Reference type must be set in an EncryptedReference object.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SelfReferenceRequiresContext">
<summary>An XmlDocument context is required to resolve the Reference Uri {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureDescriptionNotCreated">
<summary>SignatureDescription could not be created for the signature algorithm supplied.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureMethodKeyMismatch">
<summary>The key does not fit the SignatureMethod.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureMethodRequired">
<summary>A signature method is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureValueRequired">
<summary>Signature requires a SignatureValue.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignedInfoRequired">
<summary>Signature requires a SignedInfo.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_TransformIncorrectInputType">
<summary>The input type was invalid for this transform.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_IncorrectObjectType">
<summary>Type of input object is invalid.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UnknownTransform">
<summary>Unknown transform has been encountered.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriNotResolved">
<summary>Unable to resolve Uri {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriNotSupported">
<summary>The specified Uri is not supported.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriRequired">
<summary>A Uri attribute is required for a CipherReference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingContext">
<summary>Null Context property encountered.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingIRelDecryptor">
<summary>IRelDecryptor is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingIssuer">
<summary>Issuer node is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingLicence">
<summary>License node is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlUnableToDecryptGrant">
<summary>Unable to decrypt grant content.</summary>
</member>
<member name="P:System.SR.NotSupported_KeyAlgorithm">
<summary>The certificate key algorithm is not supported.</summary>
</member>
<member name="P:System.SR.Log_ActualHashValue">
<summary>Actual hash value: {0}</summary>
</member>
<member name="P:System.SR.Log_BeginCanonicalization">
<summary>Beginning canonicalization using "{0}" ({1}).</summary>
</member>
<member name="P:System.SR.Log_BeginSignatureComputation">
<summary>Beginning signature computation.</summary>
</member>
<member name="P:System.SR.Log_BeginSignatureVerification">
<summary>Beginning signature verification.</summary>
</member>
<member name="P:System.SR.Log_BuildX509Chain">
<summary>Building and verifying the X509 chain for certificate {0}.</summary>
</member>
<member name="P:System.SR.Log_CanonicalizationSettings">
<summary>Canonicalization transform is using resolver {0} and base URI "{1}".</summary>
</member>
<member name="P:System.SR.Log_CanonicalizedOutput">
<summary>Output of canonicalization transform: {0}</summary>
</member>
<member name="P:System.SR.Log_CertificateChain">
<summary>Certificate chain:</summary>
</member>
<member name="P:System.SR.Log_CheckSignatureFormat">
<summary>Checking signature format using format validator "[{0}] {1}.{2}".</summary>
</member>
<member name="P:System.SR.Log_CheckSignedInfo">
<summary>Checking signature on SignedInfo with id "{0}".</summary>
</member>
<member name="P:System.SR.Log_FormatValidationSuccessful">
<summary>Signature format validation was successful.</summary>
</member>
<member name="P:System.SR.Log_FormatValidationNotSuccessful">
<summary>Signature format validation failed.</summary>
</member>
<member name="P:System.SR.Log_KeyUsages">
<summary>Found key usages "{0}" in extension {1} on certificate {2}.</summary>
</member>
<member name="P:System.SR.Log_NoNamespacesPropagated">
<summary>No namespaces are being propagated.</summary>
</member>
<member name="P:System.SR.Log_PropagatingNamespace">
<summary>Propagating namespace {0}="{1}".</summary>
</member>
<member name="P:System.SR.Log_RawSignatureValue">
<summary>Raw signature: {0}</summary>
</member>
<member name="P:System.SR.Log_ReferenceHash">
<summary>Reference {0} hashed with "{1}" ({2}) has hash value {3}, expected hash value {4}.</summary>
</member>
<member name="P:System.SR.Log_RevocationMode">
<summary>Revocation mode for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_RevocationFlag">
<summary>Revocation flag for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_SigningAsymmetric">
<summary>Calculating signature with key {0} using signature description {1}, hash algorithm {2}, and asymmetric signature formatter {3}.</summary>
</member>
<member name="P:System.SR.Log_SigningHmac">
<summary>Calculating signature using keyed hash algorithm {0}.</summary>
</member>
<member name="P:System.SR.Log_SigningReference">
<summary>Hashing reference {0}, Uri "{1}", Id "{2}", Type "{3}" with hash algorithm "{4}" ({5}).</summary>
</member>
<member name="P:System.SR.Log_TransformedReferenceContents">
<summary>Transformed reference contents: {0}</summary>
</member>
<member name="P:System.SR.Log_UnsafeCanonicalizationMethod">
<summary>Canonicalization method "{0}" is not on the safe list. Safe canonicalization methods are: {1}.</summary>
</member>
<member name="P:System.SR.Log_UrlTimeout">
<summary>URL retrieval timeout for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed">
<summary>Verification failed checking {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_References">
<summary>references</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_SignedInfo">
<summary>SignedInfo</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_X509Chain">
<summary>X509 chain verification</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_X509KeyUsage">
<summary>X509 key usage verification</summary>
</member>
<member name="P:System.SR.Log_VerificationFlag">
<summary>Verification flags for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationTime">
<summary>Verification time for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationWithKeySuccessful">
<summary>Verification with key {0} was successful.</summary>
</member>
<member name="P:System.SR.Log_VerificationWithKeyNotSuccessful">
<summary>Verification with key {0} was not successful.</summary>
</member>
<member name="P:System.SR.Log_VerifyReference">
<summary>Processing reference {0}, Uri "{1}", Id "{2}", Type "{3}".</summary>
</member>
<member name="P:System.SR.Log_VerifySignedInfoAsymmetric">
<summary>Verifying SignedInfo using key {0}, signature description {1}, hash algorithm {2}, and asymmetric signature deformatter {3}.</summary>
</member>
<member name="P:System.SR.Log_VerifySignedInfoHmac">
<summary>Verifying SignedInfo using keyed hash algorithm {0}.</summary>
</member>
<member name="P:System.SR.Log_X509ChainError">
<summary>Error building X509 chain: {0}: {1}.</summary>
</member>
<member name="P:System.SR.Log_XmlContext">
<summary>Using context: {0}</summary>
</member>
<member name="P:System.SR.Log_SignedXmlRecursionLimit">
<summary>Signed xml recursion limit hit while trying to decrypt the key. Reference {0} hashed with "{1}" and ({2}).</summary>
</member>
<member name="P:System.SR.Log_UnsafeTransformMethod">
<summary>Transform method "{0}" is not on the safe list. Safe transform methods are: {1}.</summary>
</member>
<member name="P:System.SR.ElementCombinationMissing">
<summary>{0} and {1} can only occur in combination</summary>
</member>
<member name="P:System.SR.ElementMissing">
<summary>{0} is missing</summary>
</member>
<member name="P:System.SR.MustContainChildElement">
<summary>{0} must contain child element {1}</summary>
</member>
<member name="P:System.SR.WrongRootElement">
<summary>Root element must be {0} element in namespace {1}</summary>
</member>
</members>
</doc>

View File

@@ -0,0 +1,768 @@
<?xml version="1.0"?>
<doc>
<assembly>
<name>System.Security.Cryptography.Xml</name>
</assembly>
<members>
<member name="T:System.Security.Cryptography.Xml.CryptoSignedXmlRecursionException">
<summary>
This exception helps catch the signed XML recursion limit error.
This is being caught in the SignedXml class while computing the
hash. ComputeHash can throw different kind of exceptions.
This unique exception helps catch the recursion limit issue.
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.DSAKeyValue.GetXml">
<summary>
Create an XML representation.
</summary>
<remarks>
Based upon https://www.w3.org/TR/xmldsig-core/#sec-DSAKeyValue.
</remarks>
<returns>
An <see cref="T:System.Xml.XmlElement"/> containing the XML representation.
</returns>
</member>
<member name="M:System.Security.Cryptography.Xml.DSAKeyValue.LoadXml(System.Xml.XmlElement)">
<summary>
Deserialize from the XML representation.
</summary>
<remarks>
Based upon https://www.w3.org/TR/xmldsig-core/#sec-DSAKeyValue.
</remarks>
<param name="value">
An <see cref="T:System.Xml.XmlElement"/> containing the XML representation. This cannot be null.
</param>
<exception cref="T:System.ArgumentNullException">
<paramref name="value"/> cannot be null.
</exception>
<exception cref="T:System.Security.Cryptography.CryptographicException">
The XML has the incorrect schema or the DSA parameters are invalid.
</exception>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptedXml.IsOverXmlDsigRecursionLimit">
<summary>
This method validates the _xmlDsigSearchDepthCounter counter
if the counter is over the limit defined by admin or developer.
</summary>
<returns>returns true if the limit has reached otherwise false</returns>
</member>
<member name="P:System.Security.Cryptography.Xml.EncryptedXml.XmlDSigSearchDepth">
<summary>
Gets / Sets the max limit for recursive search of encryption key in signed XML
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#Add(System.Object)">
<internalonly/>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#Contains(System.Object)">
<internalonly/>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#IndexOf(System.Object)">
<internalonly/>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#Insert(System.Int32,System.Object)">
<internalonly/>
</member>
<member name="M:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#Remove(System.Object)">
<internalonly/>
</member>
<member name="P:System.Security.Cryptography.Xml.EncryptionPropertyCollection.System#Collections#IList#Item(System.Int32)">
<internalonly/>
</member>
<member name="P:System.Security.Cryptography.Xml.ReferenceList.System#Collections#IList#Item(System.Int32)">
<internalonly/>
</member>
<member name="M:System.Security.Cryptography.Xml.RSAKeyValue.GetXml">
<summary>
Create an XML representation.
</summary>
<remarks>
Based upon https://www.w3.org/TR/xmldsig-core/#sec-RSAKeyValue.
</remarks>
<returns>
An <see cref="T:System.Xml.XmlElement"/> containing the XML representation.
</returns>
</member>
<member name="M:System.Security.Cryptography.Xml.RSAKeyValue.LoadXml(System.Xml.XmlElement)">
<summary>
Deserialize from the XML representation.
</summary>
<remarks>
Based upon https://www.w3.org/TR/xmldsig-core/#sec-RSAKeyValue.
</remarks>
<param name="value">
An <see cref="T:System.Xml.XmlElement"/> containing the XML representation. This cannot be null.
</param>
<exception cref="T:System.ArgumentNullException">
<paramref name="value"/> cannot be null.
</exception>
<exception cref="T:System.Security.Cryptography.CryptographicException">
The XML has the incorrect schema or the RSA parameters are invalid.
</exception>
</member>
<member name="P:System.Security.Cryptography.Xml.SignedXml.SigningKeyName">
<internalonly/>
</member>
<member name="T:System.Security.Cryptography.Xml.SignedXmlDebugLog">
<summary>
Trace support for debugging issues signing and verifying XML signatures.
</summary>
</member>
<member name="T:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent">
<summary>
Types of events that are logged to the debug log
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.BeginCanonicalization">
<summary>
Canonicalization of input XML has begun
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.BeginCheckSignatureFormat">
<summary>
Verification of the signature format itself is beginning
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.BeginCheckSignedInfo">
<summary>
Verification of a signed info is beginning
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.BeginSignatureComputation">
<summary>
Signing is beginning
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.BeginSignatureVerification">
<summary>
Signature verification is beginning
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.CanonicalizedData">
<summary>
Input data has been transformed to its canonicalized form
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.FormatValidationResult">
<summary>
The result of signature format validation
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.NamespacePropagation">
<summary>
Namespaces are being propigated into the signature
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.ReferenceData">
<summary>
Output from a Reference
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.SignatureVerificationResult">
<summary>
The result of a signature verification
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.Signing">
<summary>
Calculating the final signature
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.SigningReference">
<summary>
A reference is being hashed
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.VerificationFailure">
<summary>
A signature has failed to verify
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.VerifyReference">
<summary>
Verify that a reference has the correct hash value
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.VerifySignedInfo">
<summary>
Verification is processing the SignedInfo section of the signature
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.X509Verification">
<summary>
Verification status on the x.509 certificate in use
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.UnsafeCanonicalizationMethod">
<summary>
The signature is being rejected by the signature format verifier due to having
a canonicalization algorithm which is not on the known valid list.
</summary>
</member>
<member name="F:System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent.UnsafeTransformMethod">
<summary>
The signature is being rejected by the signature verifier due to having
a transform algorithm which is not on the known valid list.
</summary>
</member>
<member name="P:System.Security.Cryptography.Xml.SignedXmlDebugLog.InformationLoggingEnabled">
<summary>
Check to see if logging should be done in this process
</summary>
</member>
<member name="P:System.Security.Cryptography.Xml.SignedXmlDebugLog.VerboseLoggingEnabled">
<summary>
Check to see if verbose log messages should be generated
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.FormatBytes(System.Byte[])">
<summary>
Convert the byte array into a hex string
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.GetKeyName(System.Object)">
<summary>
Map a key to a string describing the key
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.GetObjectId(System.Object)">
<summary>
Map an object to a string describing the object
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.GetOidName(System.Security.Cryptography.Oid)">
<summary>
Map an OID to the friendliest name possible
</summary>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogBeginCanonicalization(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Transform)">
<summary>
Log that canonicalization has begun on input data
</summary>
<param name="signedXml">SignedXml object doing the signing or verification</param>
<param name="canonicalizationTransform">transform canonicalizing the input</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogBeginCheckSignatureFormat(System.Security.Cryptography.Xml.SignedXml,System.Func{System.Security.Cryptography.Xml.SignedXml,System.Boolean})">
<summary>
Log that we're going to be validating the signature format itself
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="formatValidator">Callback delegate which is being used for format verification</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogBeginCheckSignedInfo(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.SignedInfo)">
<summary>
Log that checking SignedInfo is beginning
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="signedInfo">SignedInfo object being verified</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogBeginSignatureComputation(System.Security.Cryptography.Xml.SignedXml,System.Xml.XmlElement)">
<summary>
Log that signature computation is beginning
</summary>
<param name="signedXml">SignedXml object doing the signing</param>
<param name="context">Context of the signature</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogBeginSignatureVerification(System.Security.Cryptography.Xml.SignedXml,System.Xml.XmlElement)">
<summary>
Log that signature verification is beginning
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="context">Context of the verification</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogCanonicalizedOutput(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Transform)">
<summary>
Log the canonicalized data
</summary>
<param name="signedXml">SignedXml object doing the signing or verification</param>
<param name="canonicalizationTransform">transform canonicalizing the input</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogFormatValidationResult(System.Security.Cryptography.Xml.SignedXml,System.Boolean)">
<summary>
Log that the signature format callback has rejected the signature
</summary>
<param name="signedXml">SignedXml object doing the signature verification</param>
<param name="result">result of the signature format verification</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogUnsafeCanonicalizationMethod(System.Security.Cryptography.Xml.SignedXml,System.String,System.Collections.Generic.IEnumerable{System.String})">
<summary>
Log that a signature is being rejected as having an invalid format due to its canonicalization
algorithm not being on the valid list.
</summary>
<param name="signedXml">SignedXml object doing the signature verification</param>
<param name="algorithm">Canonicalization algorithm</param>
<param name="validAlgorithms">List of valid canonicalization algorithms</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogUnsafeTransformMethod(System.Security.Cryptography.Xml.SignedXml,System.String,System.Collections.Generic.IEnumerable{System.String},System.Collections.Generic.IEnumerable{System.String})">
<summary>
Log that a signature is being rejected as having an invalid signature due to a transform
algorithm not being on the valid list.
</summary>
<param name="signedXml">SignedXml object doing the signature verification</param>
<param name="algorithm">Transform algorithm that was not allowed</param>
<param name="validC14nAlgorithms">The valid C14N algorithms</param>
<param name="validTransformAlgorithms">The valid C14N algorithms</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogNamespacePropagation(System.Security.Cryptography.Xml.SignedXml,System.Xml.XmlNodeList)">
<summary>
Log namespaces which are being propagated into the signature
</summary>
<param name="signedXml">SignedXml doing the signing or verification</param>
<param name="namespaces">namespaces being propagated</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogReferenceData(System.Security.Cryptography.Xml.Reference,System.IO.Stream)">
<summary>
Log the output of a reference
</summary>
<param name="reference">The reference being processed</param>
<param name="data">Stream containing the output of the reference</param>
<returns>Stream containing the output of the reference</returns>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogSigning(System.Security.Cryptography.Xml.SignedXml,System.Object,System.Security.Cryptography.SignatureDescription,System.Security.Cryptography.HashAlgorithm,System.Security.Cryptography.AsymmetricSignatureFormatter)">
<summary>
Log the computation of a signature value when signing with an asymmetric algorithm
</summary>
<param name="signedXml">SignedXml object calculating the signature</param>
<param name="key">key used for signing</param>
<param name="signatureDescription">signature description being used to create the signature</param>
<param name="hash">hash algorithm used to digest the output</param>
<param name="asymmetricSignatureFormatter">signature formatter used to do the signing</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogSigning(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.KeyedHashAlgorithm)">
<summary>
Log the computation of a signature value when signing with a keyed hash algorithm
</summary>
<param name="signedXml">SignedXml object calculating the signature</param>
<param name="key">key the signature is created with</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogSigningReference(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Reference)">
<summary>
Log the calculation of a hash value of a reference
</summary>
<param name="signedXml">SignedXml object driving the signature</param>
<param name="reference">Reference being hashed</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerificationFailure(System.Security.Cryptography.Xml.SignedXml,System.String)">
<summary>
Log the specific point where a signature is determined to not be verifiable
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="failureLocation">location that the signature was determined to be invalid</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerificationResult(System.Security.Cryptography.Xml.SignedXml,System.Object,System.Boolean)">
<summary>
Log the success or failure of a signature verification operation
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="key">public key used to verify the signature</param>
<param name="verified">true if the signature verified, false otherwise</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifyKeyUsage(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.X509Certificates.X509Certificate,System.Security.Cryptography.X509Certificates.X509KeyUsageExtension)">
<summary>
Log the check for appropriate X509 key usage
</summary>
<param name="signedXml">SignedXml doing the signature verification</param>
<param name="certificate">certificate having its key usages checked</param>
<param name="keyUsages">key usages being examined</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifyReference(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Reference)">
<summary>
Log that we are verifying a reference
</summary>
<param name="signedXml">SignedXMl object doing the verification</param>
<param name="reference">reference being verified</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifyReferenceHash(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Reference,System.Byte[],System.Byte[])">
<summary>
Log the hash comparison when verifying a reference
</summary>
<param name="signedXml">SignedXml object verifying the signature</param>
<param name="reference">reference being verified</param>
<param name="actualHash">actual hash value of the reference</param>
<param name="expectedHash">hash value the signature expected the reference to have</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifySignedInfo(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.AsymmetricAlgorithm,System.Security.Cryptography.SignatureDescription,System.Security.Cryptography.HashAlgorithm,System.Security.Cryptography.AsymmetricSignatureDeformatter,System.Byte[],System.Byte[])">
<summary>
Log the verification parameters when verifying the SignedInfo section of a signature using an
asymmetric key
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="key">key being used to verify the signed info</param>
<param name="signatureDescription">type of signature description class used</param>
<param name="hashAlgorithm">type of hash algorithm used</param>
<param name="asymmetricSignatureDeformatter">type of signature deformatter used</param>
<param name="actualHashValue">hash value of the signed info</param>
<param name="signatureValue">raw signature value</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifySignedInfo(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.KeyedHashAlgorithm,System.Byte[],System.Byte[])">
<summary>
Log the verification parameters when verifying the SignedInfo section of a signature using a
keyed hash algorithm
</summary>
<param name="signedXml">SignedXml object doing the verification</param>
<param name="mac">hash algorithm doing the verification</param>
<param name="actualHashValue">hash value of the signed info</param>
<param name="signatureValue">raw signature value</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogVerifyX509Chain(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.X509Certificates.X509Chain,System.Security.Cryptography.X509Certificates.X509Certificate)">
<summary>
Log that an X509 chain is being built for a certificate
</summary>
<param name="signedXml">SignedXml object building the chain</param>
<param name="chain">chain built for the certificate</param>
<param name="certificate">certificate having the chain built for it</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.LogSignedXmlRecursionLimit(System.Security.Cryptography.Xml.SignedXml,System.Security.Cryptography.Xml.Reference)">
<summary>
Write information when user hits the Signed XML recursion depth limit issue.
This is helpful in debugging this kind of issues.
</summary>
<param name="signedXml">SignedXml object verifying the signature</param>
<param name="reference">reference being verified</param>
</member>
<member name="M:System.Security.Cryptography.Xml.SignedXmlDebugLog.WriteLine(System.Object,System.Diagnostics.TraceEventType,System.Security.Cryptography.Xml.SignedXmlDebugLog.SignedXmlDebugEvent,System.String)">
<summary>
Write data to the log
</summary>
<param name="source">object doing the trace</param>
<param name="eventType">severity of the debug event</param>
<param name="data">data being written</param>
<param name="eventId">type of event being traced</param>
</member>
<member name="M:System.Security.Cryptography.Xml.XmlDsigEnvelopedSignatureTransform.#ctor(System.Boolean)">
<internalonly/>
</member>
<member name="P:System.HexConverter.CharToHexLookup">
<summary>Map from an ASCII char to its hex value, e.g. arr['b'] == 11. 0xFF means it's not a hex digit.</summary>
</member>
<member name="P:System.SR.ArgumentOutOfRange_Index">
<summary>Index was out of range. Must be non-negative and less than the size of the collection.</summary>
</member>
<member name="P:System.SR.Arg_EmptyOrNullString">
<summary>String cannot be empty or null.</summary>
</member>
<member name="P:System.SR.Cryptography_Partial_Chain">
<summary>A certificate chain could not be built to a trusted root authority.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_BadWrappedKeySize">
<summary>Bad wrapped key size.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CipherValueElementRequired">
<summary>A Cipher Data element should have either a CipherValue or a CipherReference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreateHashAlgorithmFailed">
<summary>Could not create hash algorithm object.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreateTransformFailed">
<summary>Could not create the XML transformation identified by the URI {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreatedKeyFailed">
<summary>Failed to create signing key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_DigestMethodRequired">
<summary>A DigestMethod must be specified on a Reference prior to generating XML.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_DigestValueRequired">
<summary>A Reference must contain a DigestValue.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_EnvelopedSignatureRequiresContext">
<summary>An XmlDocument context is required for enveloped transforms.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidElement">
<summary>Malformed element {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidEncryptionProperty">
<summary>Malformed encryption property element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidKeySize">
<summary>The key size should be a non negative integer.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidReference">
<summary>Malformed reference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidSignatureLength">
<summary>The length of the signature with a MAC should be less than the hash output length.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidSignatureLength2">
<summary>The length in bits of the signature with a MAC should be a multiple of 8.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidX509IssuerSerialNumber">
<summary>X509 issuer serial number is invalid.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_KeyInfoRequired">
<summary>A KeyInfo element is required to check the signature.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_KW_BadKeySize">
<summary>The length of the encrypted data in Key Wrap is either 32, 40 or 48 bytes.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_LoadKeyFailed">
<summary>Signing key is not loaded.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingAlgorithm">
<summary>Symmetric algorithm is not specified.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingCipherData">
<summary>Cipher data is not specified.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingDecryptionKey">
<summary>Unable to retrieve the decryption key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingEncryptionKey">
<summary>Unable to retrieve the encryption key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_NotSupportedCryptographicTransform">
<summary>The specified cryptographic transform is not supported.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_ReferenceElementRequired">
<summary>At least one Reference element is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_ReferenceTypeRequired">
<summary>The Reference type must be set in an EncryptedReference object.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SelfReferenceRequiresContext">
<summary>An XmlDocument context is required to resolve the Reference Uri {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureDescriptionNotCreated">
<summary>SignatureDescription could not be created for the signature algorithm supplied.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureMethodKeyMismatch">
<summary>The key does not fit the SignatureMethod.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureMethodRequired">
<summary>A signature method is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureValueRequired">
<summary>Signature requires a SignatureValue.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignedInfoRequired">
<summary>Signature requires a SignedInfo.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_TransformIncorrectInputType">
<summary>The input type was invalid for this transform.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_IncorrectObjectType">
<summary>Type of input object is invalid.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UnknownTransform">
<summary>Unknown transform has been encountered.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriNotResolved">
<summary>Unable to resolve Uri {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriNotSupported">
<summary>The specified Uri is not supported.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriRequired">
<summary>A Uri attribute is required for a CipherReference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingContext">
<summary>Null Context property encountered.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingIRelDecryptor">
<summary>IRelDecryptor is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingIssuer">
<summary>Issuer node is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingLicence">
<summary>License node is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlUnableToDecryptGrant">
<summary>Unable to decrypt grant content.</summary>
</member>
<member name="P:System.SR.NotSupported_KeyAlgorithm">
<summary>The certificate key algorithm is not supported.</summary>
</member>
<member name="P:System.SR.Log_ActualHashValue">
<summary>Actual hash value: {0}</summary>
</member>
<member name="P:System.SR.Log_BeginCanonicalization">
<summary>Beginning canonicalization using "{0}" ({1}).</summary>
</member>
<member name="P:System.SR.Log_BeginSignatureComputation">
<summary>Beginning signature computation.</summary>
</member>
<member name="P:System.SR.Log_BeginSignatureVerification">
<summary>Beginning signature verification.</summary>
</member>
<member name="P:System.SR.Log_BuildX509Chain">
<summary>Building and verifying the X509 chain for certificate {0}.</summary>
</member>
<member name="P:System.SR.Log_CanonicalizationSettings">
<summary>Canonicalization transform is using resolver {0} and base URI "{1}".</summary>
</member>
<member name="P:System.SR.Log_CanonicalizedOutput">
<summary>Output of canonicalization transform: {0}</summary>
</member>
<member name="P:System.SR.Log_CertificateChain">
<summary>Certificate chain:</summary>
</member>
<member name="P:System.SR.Log_CheckSignatureFormat">
<summary>Checking signature format using format validator "[{0}] {1}.{2}".</summary>
</member>
<member name="P:System.SR.Log_CheckSignedInfo">
<summary>Checking signature on SignedInfo with id "{0}".</summary>
</member>
<member name="P:System.SR.Log_FormatValidationSuccessful">
<summary>Signature format validation was successful.</summary>
</member>
<member name="P:System.SR.Log_FormatValidationNotSuccessful">
<summary>Signature format validation failed.</summary>
</member>
<member name="P:System.SR.Log_KeyUsages">
<summary>Found key usages "{0}" in extension {1} on certificate {2}.</summary>
</member>
<member name="P:System.SR.Log_NoNamespacesPropagated">
<summary>No namespaces are being propagated.</summary>
</member>
<member name="P:System.SR.Log_PropagatingNamespace">
<summary>Propagating namespace {0}="{1}".</summary>
</member>
<member name="P:System.SR.Log_RawSignatureValue">
<summary>Raw signature: {0}</summary>
</member>
<member name="P:System.SR.Log_ReferenceHash">
<summary>Reference {0} hashed with "{1}" ({2}) has hash value {3}, expected hash value {4}.</summary>
</member>
<member name="P:System.SR.Log_RevocationMode">
<summary>Revocation mode for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_RevocationFlag">
<summary>Revocation flag for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_SigningAsymmetric">
<summary>Calculating signature with key {0} using signature description {1}, hash algorithm {2}, and asymmetric signature formatter {3}.</summary>
</member>
<member name="P:System.SR.Log_SigningHmac">
<summary>Calculating signature using keyed hash algorithm {0}.</summary>
</member>
<member name="P:System.SR.Log_SigningReference">
<summary>Hashing reference {0}, Uri "{1}", Id "{2}", Type "{3}" with hash algorithm "{4}" ({5}).</summary>
</member>
<member name="P:System.SR.Log_TransformedReferenceContents">
<summary>Transformed reference contents: {0}</summary>
</member>
<member name="P:System.SR.Log_UnsafeCanonicalizationMethod">
<summary>Canonicalization method "{0}" is not on the safe list. Safe canonicalization methods are: {1}.</summary>
</member>
<member name="P:System.SR.Log_UrlTimeout">
<summary>URL retrieval timeout for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed">
<summary>Verification failed checking {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_References">
<summary>references</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_SignedInfo">
<summary>SignedInfo</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_X509Chain">
<summary>X509 chain verification</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_X509KeyUsage">
<summary>X509 key usage verification</summary>
</member>
<member name="P:System.SR.Log_VerificationFlag">
<summary>Verification flags for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationTime">
<summary>Verification time for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationWithKeySuccessful">
<summary>Verification with key {0} was successful.</summary>
</member>
<member name="P:System.SR.Log_VerificationWithKeyNotSuccessful">
<summary>Verification with key {0} was not successful.</summary>
</member>
<member name="P:System.SR.Log_VerifyReference">
<summary>Processing reference {0}, Uri "{1}", Id "{2}", Type "{3}".</summary>
</member>
<member name="P:System.SR.Log_VerifySignedInfoAsymmetric">
<summary>Verifying SignedInfo using key {0}, signature description {1}, hash algorithm {2}, and asymmetric signature deformatter {3}.</summary>
</member>
<member name="P:System.SR.Log_VerifySignedInfoHmac">
<summary>Verifying SignedInfo using keyed hash algorithm {0}.</summary>
</member>
<member name="P:System.SR.Log_X509ChainError">
<summary>Error building X509 chain: {0}: {1}.</summary>
</member>
<member name="P:System.SR.Log_XmlContext">
<summary>Using context: {0}</summary>
</member>
<member name="P:System.SR.Log_SignedXmlRecursionLimit">
<summary>Signed xml recursion limit hit while trying to decrypt the key. Reference {0} hashed with "{1}" and ({2}).</summary>
</member>
<member name="P:System.SR.Log_UnsafeTransformMethod">
<summary>Transform method "{0}" is not on the safe list. Safe transform methods are: {1}.</summary>
</member>
<member name="P:System.SR.ElementCombinationMissing">
<summary>{0} and {1} can only occur in combination</summary>
</member>
<member name="P:System.SR.ElementMissing">
<summary>{0} is missing</summary>
</member>
<member name="P:System.SR.MustContainChildElement">
<summary>{0} must contain child element {1}</summary>
</member>
<member name="P:System.SR.WrongRootElement">
<summary>Root element must be {0} element in namespace {1}</summary>
</member>
<member name="T:System.Runtime.Versioning.OSPlatformAttribute">
<summary>
Base type for all platform-specific API attributes.
</summary>
</member>
<member name="T:System.Runtime.Versioning.TargetPlatformAttribute">
<summary>
Records the platform that the project targeted.
</summary>
</member>
<member name="T:System.Runtime.Versioning.SupportedOSPlatformAttribute">
<summary>
Records the operating system (and minimum version) that supports an API. Multiple attributes can be
applied to indicate support on multiple operating systems.
</summary>
<remarks>
Callers can apply a <see cref="T:System.Runtime.Versioning.SupportedOSPlatformAttribute" />
or use guards to prevent calls to APIs on unsupported operating systems.
A given platform should only be specified once.
</remarks>
</member>
<member name="T:System.Runtime.Versioning.UnsupportedOSPlatformAttribute">
<summary>
Marks APIs that were removed in a given operating system version.
</summary>
<remarks>
Primarily used by OS bindings to indicate APIs that are only available in
earlier versions.
</remarks>
</member>
<member name="T:System.Runtime.Versioning.SupportedOSPlatformGuardAttribute">
<summary>
Annotates a custom guard field, property or method with a supported platform name and optional version.
Multiple attributes can be applied to indicate guard for multiple supported platforms.
</summary>
<remarks>
Callers can apply a <see cref="T:System.Runtime.Versioning.SupportedOSPlatformGuardAttribute" /> to a field, property or method
and use that field, property or method in a conditional or assert statements in order to safely call platform specific APIs.
The type of the field or property should be boolean, the method return type should be boolean in order to be used as platform guard.
</remarks>
</member>
<member name="T:System.Runtime.Versioning.UnsupportedOSPlatformGuardAttribute">
<summary>
Annotates the custom guard field, property or method with an unsupported platform name and optional version.
Multiple attributes can be applied to indicate guard for multiple unsupported platforms.
</summary>
<remarks>
Callers can apply a <see cref="T:System.Runtime.Versioning.UnsupportedOSPlatformGuardAttribute" /> to a field, property or method
and use that field, property or method in a conditional or assert statements as a guard to safely call APIs unsupported on those platforms.
The type of the field or property should be boolean, the method return type should be boolean in order to be used as platform guard.
</remarks>
</member>
</members>
</doc>

View File

@@ -0,0 +1,336 @@
<?xml version="1.0"?>
<doc>
<assembly>
<name>System.Security.Cryptography.Xml</name>
</assembly>
<members>
<member name="P:System.SR.ArgumentOutOfRange_Index">
<summary>Index was out of range. Must be non-negative and less than the size of the collection.</summary>
</member>
<member name="P:System.SR.Arg_EmptyOrNullString">
<summary>String cannot be empty or null.</summary>
</member>
<member name="P:System.SR.Cryptography_Partial_Chain">
<summary>A certificate chain could not be built to a trusted root authority.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_BadWrappedKeySize">
<summary>Bad wrapped key size.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CipherValueElementRequired">
<summary>A Cipher Data element should have either a CipherValue or a CipherReference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreateHashAlgorithmFailed">
<summary>Could not create hash algorithm object.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreateTransformFailed">
<summary>Could not create the XML transformation identified by the URI {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_CreatedKeyFailed">
<summary>Failed to create signing key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_DigestMethodRequired">
<summary>A DigestMethod must be specified on a Reference prior to generating XML.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_DigestValueRequired">
<summary>A Reference must contain a DigestValue.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_EnvelopedSignatureRequiresContext">
<summary>An XmlDocument context is required for enveloped transforms.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidElement">
<summary>Malformed element {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidEncryptionProperty">
<summary>Malformed encryption property element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidKeySize">
<summary>The key size should be a non negative integer.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidReference">
<summary>Malformed reference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidSignatureLength">
<summary>The length of the signature with a MAC should be less than the hash output length.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidSignatureLength2">
<summary>The length in bits of the signature with a MAC should be a multiple of 8.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_InvalidX509IssuerSerialNumber">
<summary>X509 issuer serial number is invalid.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_KeyInfoRequired">
<summary>A KeyInfo element is required to check the signature.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_KW_BadKeySize">
<summary>The length of the encrypted data in Key Wrap is either 32, 40 or 48 bytes.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_LoadKeyFailed">
<summary>Signing key is not loaded.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingAlgorithm">
<summary>Symmetric algorithm is not specified.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingCipherData">
<summary>Cipher data is not specified.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingDecryptionKey">
<summary>Unable to retrieve the decryption key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_MissingEncryptionKey">
<summary>Unable to retrieve the encryption key.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_NotSupportedCryptographicTransform">
<summary>The specified cryptographic transform is not supported.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_ReferenceElementRequired">
<summary>At least one Reference element is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_ReferenceTypeRequired">
<summary>The Reference type must be set in an EncryptedReference object.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SelfReferenceRequiresContext">
<summary>An XmlDocument context is required to resolve the Reference Uri {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureDescriptionNotCreated">
<summary>SignatureDescription could not be created for the signature algorithm supplied.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureMethodKeyMismatch">
<summary>The key does not fit the SignatureMethod.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureMethodRequired">
<summary>A signature method is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignatureValueRequired">
<summary>Signature requires a SignatureValue.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_SignedInfoRequired">
<summary>Signature requires a SignedInfo.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_TransformIncorrectInputType">
<summary>The input type was invalid for this transform.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_IncorrectObjectType">
<summary>Type of input object is invalid.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UnknownTransform">
<summary>Unknown transform has been encountered.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriNotResolved">
<summary>Unable to resolve Uri {0}.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriNotSupported">
<summary>The specified Uri is not supported.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_UriRequired">
<summary>A Uri attribute is required for a CipherReference element.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingContext">
<summary>Null Context property encountered.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingIRelDecryptor">
<summary>IRelDecryptor is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingIssuer">
<summary>Issuer node is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlMissingLicence">
<summary>License node is required.</summary>
</member>
<member name="P:System.SR.Cryptography_Xml_XrmlUnableToDecryptGrant">
<summary>Unable to decrypt grant content.</summary>
</member>
<member name="P:System.SR.NotSupported_KeyAlgorithm">
<summary>The certificate key algorithm is not supported.</summary>
</member>
<member name="P:System.SR.Log_ActualHashValue">
<summary>Actual hash value: {0}</summary>
</member>
<member name="P:System.SR.Log_BeginCanonicalization">
<summary>Beginning canonicalization using "{0}" ({1}).</summary>
</member>
<member name="P:System.SR.Log_BeginSignatureComputation">
<summary>Beginning signature computation.</summary>
</member>
<member name="P:System.SR.Log_BeginSignatureVerification">
<summary>Beginning signature verification.</summary>
</member>
<member name="P:System.SR.Log_BuildX509Chain">
<summary>Building and verifying the X509 chain for certificate {0}.</summary>
</member>
<member name="P:System.SR.Log_CanonicalizationSettings">
<summary>Canonicalization transform is using resolver {0} and base URI "{1}".</summary>
</member>
<member name="P:System.SR.Log_CanonicalizedOutput">
<summary>Output of canonicalization transform: {0}</summary>
</member>
<member name="P:System.SR.Log_CertificateChain">
<summary>Certificate chain:</summary>
</member>
<member name="P:System.SR.Log_CheckSignatureFormat">
<summary>Checking signature format using format validator "[{0}] {1}.{2}".</summary>
</member>
<member name="P:System.SR.Log_CheckSignedInfo">
<summary>Checking signature on SignedInfo with id "{0}".</summary>
</member>
<member name="P:System.SR.Log_FormatValidationSuccessful">
<summary>Signature format validation was successful.</summary>
</member>
<member name="P:System.SR.Log_FormatValidationNotSuccessful">
<summary>Signature format validation failed.</summary>
</member>
<member name="P:System.SR.Log_KeyUsages">
<summary>Found key usages "{0}" in extension {1} on certificate {2}.</summary>
</member>
<member name="P:System.SR.Log_NoNamespacesPropagated">
<summary>No namespaces are being propagated.</summary>
</member>
<member name="P:System.SR.Log_PropagatingNamespace">
<summary>Propagating namespace {0}="{1}".</summary>
</member>
<member name="P:System.SR.Log_RawSignatureValue">
<summary>Raw signature: {0}</summary>
</member>
<member name="P:System.SR.Log_ReferenceHash">
<summary>Reference {0} hashed with "{1}" ({2}) has hash value {3}, expected hash value {4}.</summary>
</member>
<member name="P:System.SR.Log_RevocationMode">
<summary>Revocation mode for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_RevocationFlag">
<summary>Revocation flag for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_SigningAsymmetric">
<summary>Calculating signature with key {0} using signature description {1}, hash algorithm {2}, and asymmetric signature formatter {3}.</summary>
</member>
<member name="P:System.SR.Log_SigningHmac">
<summary>Calculating signature using keyed hash algorithm {0}.</summary>
</member>
<member name="P:System.SR.Log_SigningReference">
<summary>Hashing reference {0}, Uri "{1}", Id "{2}", Type "{3}" with hash algorithm "{4}" ({5}).</summary>
</member>
<member name="P:System.SR.Log_TransformedReferenceContents">
<summary>Transformed reference contents: {0}</summary>
</member>
<member name="P:System.SR.Log_UnsafeCanonicalizationMethod">
<summary>Canonicalization method "{0}" is not on the safe list. Safe canonicalization methods are: {1}.</summary>
</member>
<member name="P:System.SR.Log_UrlTimeout">
<summary>URL retrieval timeout for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed">
<summary>Verification failed checking {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_References">
<summary>references</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_SignedInfo">
<summary>SignedInfo</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_X509Chain">
<summary>X509 chain verification</summary>
</member>
<member name="P:System.SR.Log_VerificationFailed_X509KeyUsage">
<summary>X509 key usage verification</summary>
</member>
<member name="P:System.SR.Log_VerificationFlag">
<summary>Verification flags for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationTime">
<summary>Verification time for chain building: {0}.</summary>
</member>
<member name="P:System.SR.Log_VerificationWithKeySuccessful">
<summary>Verification with key {0} was successful.</summary>
</member>
<member name="P:System.SR.Log_VerificationWithKeyNotSuccessful">
<summary>Verification with key {0} was not successful.</summary>
</member>
<member name="P:System.SR.Log_VerifyReference">
<summary>Processing reference {0}, Uri "{1}", Id "{2}", Type "{3}".</summary>
</member>
<member name="P:System.SR.Log_VerifySignedInfoAsymmetric">
<summary>Verifying SignedInfo using key {0}, signature description {1}, hash algorithm {2}, and asymmetric signature deformatter {3}.</summary>
</member>
<member name="P:System.SR.Log_VerifySignedInfoHmac">
<summary>Verifying SignedInfo using keyed hash algorithm {0}.</summary>
</member>
<member name="P:System.SR.Log_X509ChainError">
<summary>Error building X509 chain: {0}: {1}.</summary>
</member>
<member name="P:System.SR.Log_XmlContext">
<summary>Using context: {0}</summary>
</member>
<member name="P:System.SR.Log_SignedXmlRecursionLimit">
<summary>Signed xml recursion limit hit while trying to decrypt the key. Reference {0} hashed with "{1}" and ({2}).</summary>
</member>
<member name="P:System.SR.Log_UnsafeTransformMethod">
<summary>Transform method "{0}" is not on the safe list. Safe transform methods are: {1}.</summary>
</member>
<member name="P:System.SR.ElementCombinationMissing">
<summary>{0} and {1} can only occur in combination</summary>
</member>
<member name="P:System.SR.ElementMissing">
<summary>{0} is missing</summary>
</member>
<member name="P:System.SR.MustContainChildElement">
<summary>{0} must contain child element {1}</summary>
</member>
<member name="P:System.SR.WrongRootElement">
<summary>Root element must be {0} element in namespace {1}</summary>
</member>
<member name="T:System.Runtime.Versioning.OSPlatformAttribute">
<summary>
Base type for all platform-specific API attributes.
</summary>
</member>
<member name="T:System.Runtime.Versioning.TargetPlatformAttribute">
<summary>
Records the platform that the project targeted.
</summary>
</member>
<member name="T:System.Runtime.Versioning.SupportedOSPlatformAttribute">
<summary>
Records the operating system (and minimum version) that supports an API. Multiple attributes can be
applied to indicate support on multiple operating systems.
</summary>
<remarks>
Callers can apply a <see cref="T:System.Runtime.Versioning.SupportedOSPlatformAttribute" />
or use guards to prevent calls to APIs on unsupported operating systems.
A given platform should only be specified once.
</remarks>
</member>
<member name="T:System.Runtime.Versioning.UnsupportedOSPlatformAttribute">
<summary>
Marks APIs that were removed in a given operating system version.
</summary>
<remarks>
Primarily used by OS bindings to indicate APIs that are only available in
earlier versions.
</remarks>
</member>
<member name="T:System.Runtime.Versioning.SupportedOSPlatformGuardAttribute">
<summary>
Annotates a custom guard field, property or method with a supported platform name and optional version.
Multiple attributes can be applied to indicate guard for multiple supported platforms.
</summary>
<remarks>
Callers can apply a <see cref="T:System.Runtime.Versioning.SupportedOSPlatformGuardAttribute" /> to a field, property or method
and use that field, property or method in a conditional or assert statements in order to safely call platform specific APIs.
The type of the field or property should be boolean, the method return type should be boolean in order to be used as platform guard.
</remarks>
</member>
<member name="T:System.Runtime.Versioning.UnsupportedOSPlatformGuardAttribute">
<summary>
Annotates the custom guard field, property or method with an unsupported platform name and optional version.
Multiple attributes can be applied to indicate guard for multiple unsupported platforms.
</summary>
<remarks>
Callers can apply a <see cref="T:System.Runtime.Versioning.UnsupportedOSPlatformGuardAttribute" /> to a field, property or method
and use that field, property or method in a conditional or assert statements as a guard to safely call APIs unsupported on those platforms.
The type of the field or property should be boolean, the method return type should be boolean in order to be used as platform guard.
</remarks>
</member>
</members>
</doc>