The BlowfishCipher type exposes the following members.
Back to Top
Back to Top
Methods
| Name | Description | |
|---|---|---|
| BCrypt | 
            Uses the cipher to generate a BCrypt hash.
              | |
| BCrypt( Byte , Byte , Int32) | 
            Uses the given key, salt, and cost to generate a BCrypt hash.
              | |
| BCrypt( Byte , Byte , Int32, EksBlowfishKeyExpansionFlags) | 
            Uses the given key, salt, and cost to generate a BCrypt hash.
            Flags may modify the key expansion.
              | |
| Create | 
            Creates a Blowfish cipher using the provided key.
              | |
| CreateEks( Byte , Byte , Int32) | 
            Performs an Expensive Key Schedule (EKS) Blowfish key expansion and
            creates a Blowfish cipher using the result.
              | |
| CreateEks( Byte , Byte , Int32, EksBlowfishKeyExpansionFlags) | 
            Performs an Expensive Key Schedule (EKS) Blowfish key expansion and
            creates a Blowfish cipher using the result. Flags may modify the key expansion.
              | |
| Decipher( Byte , Int32) | 
            Reverses the encipherment of eight bytes of data in-place.
              | |
| Decipher(UInt32 , UInt32 ) | 
            Reverses the encipherment of eight bytes of data.
              | |
| Decipher( Byte , Int32, Byte , Int32) | 
            Reverses the encipherment of eight bytes of data from one buffer and places the result in another buffer.
              | |
| Dispose | 
            Clears all memory used by the cipher.
              | |
| Encipher( Byte , Int32) | 
            Enciphers eight bytes of data in-place.
              | |
| Encipher(UInt32 , UInt32 ) | 
            Enciphers eight bytes of data.
              | |
| Encipher( Byte , Int32, Byte , Int32) | 
            Enciphers eight bytes of data from one buffer and places the result in another buffer.
              | 
Properties
| Name | Description | |
|---|---|---|
| BCryptLength | 
            The number of bytes returned by BCrypt .
              | |
| BCryptMagic | 
            The special string used encrypted in the BCrypt algorithm.
              | |
| IsKeyWeak | 
            A Blowfish key is weak if one of its S-boxes has a duplicate entry.
            See http://www.schneier.com/paper-blowfish-oneyear.html for more information.
              | 
See Also